Few would deny the chief security officer role has evolved quite a bit in recent years. At many large companies, the heads of both physical and information security now report in to the same person, an enterprise CSO.
Browsing: CISO
Last week we posted an article on the 25 Information Security Leaders to follow on Twitter [link], unfortunately, as some of our eagle eyed readers pointed out, our list was dominated by men
Everyone has an opinion about the ‘Cloud’ and its effect on business – some believe it is dark and scary and fraught with unnecessary risk, while others would argue it’s silver lined and the path to greater business performance and cost savings.
The benefits of adopting cloud technologies have been widely reported and are commonly understood. However, cloud brings with it many questions and concerns about jurisdictional and regulatory control over the privacy and protection of sensitive data.
The Odisha Government has decided to designate Additional Director General of Police (Crime) as the Chief Information Security Officer (CISO) of the State.
A new Red Alert Research Report from Varonis, based on survey data from 248 information security professionals, indicates that a mere 6% of companies have automated breach detection.
Protection of consumer data in the cloud features highly in the Australian Computer Society’s (ACS’s) call for submissions on the federal government-backed Consumer Cloud Protocol (CCP).
While the majority of CISOs may profess a commitment to managing security based on risk management principles, the truth about how they execute on those principles may be a lot more imperfect.
In this video, Bruce Schneier talks about trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. But in any system of trust, there is an alternative, parasitic, strategy that involves abusing that trust.
The UK Home Office has launched a new £4m information security awareness campaign, designed to educate businesses and consumers about rising hacker threats. The first stage of the campaign is due to get underway in the autumn.