A recent FireEye report, based
on interviews with 800 CISOs, showed that more than half of all
businesses aren’t ready for a cyberattack.
Additionally, in a study by the Ponemon Institute, nearly two-thirds of all
businesses experienced a cyberattack or breach in the previous 12
months. 65% of respondents said...
What the Good News Is, What to Watch Out For, and What to Do About It
Shifting security even further to the left to
achieve scale and speed requires a carefully
weighed understanding of the state of security.
Download this DevSecOps guide which presents:
Trends that will help
bolster the capabilities of...
Including psychology in cybersecurity educational awareness programs allows employees to recognize and trust their own instincts when dealing with a potential security incident, says Denise Beardon, head of information security engagement at international law firm Pinsent Masons.
Zero Trust: Is it the operational model that's going to propel us into a more secure future? Or just another marketing message to be tossed onto the pile of past campaigns? In this latest Cybersecurity Leadership panel, the top minds in the sector weigh in on the present and future of Zero Trust.
Leon Ravenna, CISO of KAR Global, starts each day on the job with the expectation that this could be his last. That's how urgent cybersecurity has become, and it's in part why he's driven to dispatch the image of the CISO as the bureaucratic "Dr. No."
Marcus Rameke of Nikko Asset Management Group in New Zealand shares how he led the digital transformation journey to enable it to fulfill new business requirements using an agile approach that made staff more mobile and able to achieve better productivity and revenue and improve client satisfaction.
It makes sense that automated mainframe software testing would deliver significant business benefits, from increased developer productivity to cleaner code to faster application delivery. But what kind of quantified results and ROI can you expect?
Download this Forrester study commissioned by BMC Compuware and...
Norway's railway network, Bane NOR, is undergoing a nationwide digitization process. Its CISO, Tom Remberg, describes the task of replacing legacy technology with digital train control and traffic management systems and how his role as CISO is critical to making that transformation happen.
The latest edition of the ISMG Security Report features insight from U.S. Sen. Angus King on why the federal government needs to declare a clear response to cybercriminals in order to deter them. Also featured: Ransomware affiliates gain power and promoting diversity of thought in cybersecurity.
While doing digital transformation, CISOs tend to look more at technology and try to adapt it without making the distinction between technologies that are must-have and good to have. Krishnamurthy Rajesh of ICRA says CISOs must analyze risks, update security, and change the mindset of employees.
Four ISMG editors discuss important cybersecurity issues, including law enforcement authorities' disruption of ransomware gang REvil's operations, how to collaborate as an industry to fight the surge in ransomware attacks hitting businesses, and increasing diversity and inclusion in the workplace.
Microsoft launched a four-year campaign on Thursday with community colleges in the U.S. aimed at recruiting hundreds of thousands of people into the field of cybersecurity. The goal is to fill an expected shortfall of 250,000 workers in cybersecurity, which Microsoft says means rising risk.
Controls are the critical foundation of an effective enterprise cybersecurity program.
With more threats, more systems to protect, more tools to deploy, and more people to manage, there is constant pressure to move faster and to keep up with the everchanging risk landscape.
There is a need for the...
In preparation for the relaunch of ISMG’s education platform, CyberEd.io, Ron Ross of the National Institute of Standards and Technology and Brian Barnier, who is designing a course on critical thinking and design thinking, discuss the need for reorienting toward systems thinking in cybersecurity.