Discover what a supply chain attack is and why it’s a critical threat for modern organizations. Learn lessons from SolarWinds, NotPetya, and Kaseya, plus actionable insights for SOC analysts, CISOs, and cybersecurity teams to defend…
Discover what a supply chain attack is and why it’s a critical threat for modern organizations. Learn lessons from SolarWinds, NotPetya, and Kaseya, plus actionable insights for SOC analysts, CISOs, and cybersecurity teams to defend…
We help CISOs, security teams, consulting firms and decision-makers understand cyber risk in context, anticipate impact and support risk-informed, strategic cybersecurity decisions.
6/6
We help CISOs, security teams, consulting firms and decision-makers understand cyber risk in context, anticipate impact and support risk-informed, strategic cybersecurity decisions.
6/6
https://www.csoonline.com/article/4082497/openai-launches-aardvark-to-detect-and-patch-hidden-bugs-in-code.html
https://www.csoonline.com/article/4082497/openai-launches-aardvark-to-detect-and-patch-hidden-bugs-in-code.html
Lost credentials and weak authentication controls still sit at the center of many security incidents. IT leaders and CISOs know this problem well. They also know that regulators watch how organizations protect passwor…
#hackernews #news
Lost credentials and weak authentication controls still sit at the center of many security incidents. IT leaders and CISOs know this problem well. They also know that regulators watch how organizations protect passwor…
#hackernews #news
Introduction: The traditional role of the Chief Information Security Officer (CISO) as a gatekeeper focused solely on threat prevention is obsolete. The modern, world-class CISO…
Introduction: The traditional role of the Chief Information Security Officer (CISO) as a gatekeeper focused solely on threat prevention is obsolete. The modern, world-class CISO…
Introduction: In the high-stakes world of cybersecurity, a data breach triggers a crisis mode that goes far beyond technical remediation. For Chief Information Security Officers (CISOs), it…
Introduction: In the high-stakes world of cybersecurity, a data breach triggers a crisis mode that goes far beyond technical remediation. For Chief Information Security Officers (CISOs), it…
Allerdings musste ich leider hin und wieder auch CISOs & Co. kennenlernen, die tatsächlich keinen Schimmer von BCM hatten und das auch ganz offen sagten, weil sie dachten, wenn ich nur Servicemanagement auditiere, spielt ja BCM keine Rolle - ich hab die dann ihre eigenen SLAs lesen lassen 😅
Allerdings musste ich leider hin und wieder auch CISOs & Co. kennenlernen, die tatsächlich keinen Schimmer von BCM hatten und das auch ganz offen sagten, weil sie dachten, wenn ich nur Servicemanagement auditiere, spielt ja BCM keine Rolle - ich hab die dann ihre eigenen SLAs lesen lassen 😅
Sorry. Als Auditor kann ich da nur traurig lachen:
Gerade von diesen Leuten erwarte ich, dass sie BCM (Business Continuity Management) beherrschen:
Sorry. Als Auditor kann ich da nur traurig lachen:
Gerade von diesen Leuten erwarte ich, dass sie BCM (Business Continuity Management) beherrschen:
#resources #career #leadership #cybersecurity
Origin | Interest | Match
#resources #career #leadership #cybersecurity
Origin | Interest | Match
I was on a four person conference panel with three CISOs/execs. The article is my extended response to the question asking how we convince executives to spend money on security.
open.substack.com/pub/brucepar...
#cybersecurity
I was on a four person conference panel with three CISOs/execs. The article is my extended response to the question asking how we convince executives to spend money on security.
open.substack.com/pub/brucepar...
#cybersecurity
At a fraction of the cost.
Every company worrying about "AI safety" should be panicking about AI-powered cyber attacks.
The offensive cyber tools are about to outpace defense by years.
Sleep well, CISOs.
At a fraction of the cost.
Every company worrying about "AI safety" should be panicking about AI-powered cyber attacks.
The offensive cyber tools are about to outpace defense by years.
Sleep well, CISOs.
In 2025, the stakes changed. CISOs were hauled into courtrooms. Boards confronted a wave of shareholder lawsuits. And the rise of autonomous systems introduced fresh ambiguity and risk a…
#hackernews #news
In 2025, the stakes changed. CISOs were hauled into courtrooms. Boards confronted a wave of shareholder lawsuits. And the rise of autonomous systems introduced fresh ambiguity and risk a…
#hackernews #news
Read here: spr.ly/63324CDHZ8
#FoundryExpert #CyberSecurity #CISOLeadership
Read here: spr.ly/63324CDHZ8
#FoundryExpert #CyberSecurity #CISOLeadership