CISO Suite
Cyber Risk Management: A Beginner’s Guide
With the emergence of new cybersecurity regulations like the SEC’s incident disclosure rules and the EU’s NIS2 Directive, much attention is directed towards understanding and complying with these new incident reporting requirements ...
Cybersecurity Infrastructure Investment Crashes and Burns Without Governance
Just like pilot awareness is crucial during unexpected aviation events, cybersecurity's traditional focus on infrastructure needs to shift to more adept governance ...
Security Boulevard
2024 IT Risk and Compliance Benchmark Report Findings: Why Unifying Risk and Compliance Work Is No Longer Optional
Each year, we ask over 1,000 IT and GRC professionals about their priorities for the coming year and operational aspects, like changes to budgets, staffing, challenges, and much more. What we found ...
Get Clean, Stay Clean, Optimize – The Cure for Distressed IGA Deployments
Gartner recently released a report titled “Avoid These Top 5 Mistakes When Deploying IGA” by analyst Brian Guthrie. In the report, Gartner estimates that 50% of IGA deployments are in “distress.” The ...
Alyssa Miller: Charting the Course Through InfoSec and Aviation
Tom Eston | | Alyssa Miller, aviation, Business, career, CISO, Cloud, Cloud Security, conference, Cyber Security, Cybersecurity, Cybersecurity Industry, Data Privacy, Digital Privacy, Episodes, hacker, HR, Information Security, Infosec, jobs, Pilot, Podcast, Podcasts, Privacy, recruiting, security, technology, Weekly Edition
In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey ...
Safeguarding Patient Data with HITRUST Compliance: A Comprehensive Guide for Healthcare Technology Companies
Healthcare organizations increasingly rely on technology to store, manage, and transmit sensitive patient information. As a result, safeguarding patient data against cyber threats and ensuring compliance with regulatory standards is critical, and ...
Closing the False Positives Gap for SOC Efficiency
Eliminating false positives can remarkably enhance security operations center (SOC) efficiency and cost-effectiveness ...
Security Boulevard
Safeguarding Your SAP Landscape: Why Continuous Controls Monitoring is a CFO, CISO, and Business Owner’s Best Friend
Kyle Benson | | CCM, continuous controls monitoring, Finance & Internal Controls, risk management, SAP
The stakes have never been higher for protecting your SAP environment. From financial integrity to cybersecurity threats, ensuring robust controls is essential. However, traditional, manual control monitoring methods are often inefficient, resource-intensive, ...
Cisco VPN Hijacking Flaw In Secure Client Software Patched
Wajahat Raja | | Cisco solutions, Cisco VPN hijacking flaw, CVE-2024-20337, CVE-2024-20338, Cyber threat landscape, Cybersecurity, Cybersecurity News, Cybersecurity Strategy, Endpoint Protection, Network vulnerabilities, patch management, Secure Client software, security patches, threat actors, VPN security, Zero-Trust Network Architecture (ZTNA)
In light of recent events, Cisco has released patches for two high-severity network vulnerabilities in its Secure Client. As per recent reports, vulnerabilities leading to the Cisco VPN hijacking flaw are being ...
Introducing Pathlock Cloud’s Continuous Controls Monitoring – Revolutionizing Compliance and Risk Management
Navigating a landscape of ever-changing regulations and evolving threats, where data breaches and internal fraud make frequent headlines, robust controls monitoring has become more critical than ever. Organizations need visibility into their ...