CISO Suite
A Wake-Up Call for Emerging Cybersecurity Compliance Changes
Steve Winterfeld | | CISOs, Compliance, criminal liability, Cyberlaw, Cybersecurity, regulations, risk, security
As the year kicks off, now is a good time to think through what updates to your compliance program might be needed ...
Security Boulevard
Tapping into the Potential of Generative AI in Cybersecurity
If ever there was a technology of the moment, it is generative AI. Thanks to the breakout success of OpenAI’s ChatGPT offering, the tech has achieved unprecedented global awareness—from the home user ...
Introducing the Wallarm 2024 API ThreatStatsTM Report
girishwallarm | | AI Application Security, API discovery, API management, API security, CISO, Cloud Security, cyberattacks, DEVOPS, Different attack types, owasp, Researcher Corner, waf, Web Application Security
The Wallarm Security Research team is pleased to share the latest version of our API ThreatStats report. This report serves as a key resource for API, Application security practitioners. It emphasizes the ...
What the Charges Against the SolarWinds CISO Mean for Security in 2024
The indictment of the SolarWinds CISO by the SEC served as a harsh wake-up call to the corporate world ...
Security Boulevard
Everything you need to know about the SEC Form 8-K
You may have heard more about the SEC Form 8-K recently due to changes that went into effect on Dec 16, 2023. From the SEC’s press release: The new rules will require ...
Navigating the evolving browser security landscape in 2024
Devin Ertel | | Browser Security, Cybersecurity Strategy, education, remote work, Threat Trends & Research
Web browsers shape the digital world as they connect us to information, transactions, and the world with every click, scroll, and search. With 75% of enterprise employees now spending the majority of ...
10 Hidden Responsibilities of the Modern CISO
Nik Hewitt | | advice, anlaysis, Best Practices, CISO, Cybersecurity, next gen security, security, Security Research
The responsibilities of the modern CISO are many and varied, and it’s hard work and due diligence that keep companies afloat The Chief Information Security Officer (CISO) is rightly perceived as the ...
Webinar: Join us for the latest in API Threats on January 24, 2024
girishwallarm | | AI Application Security, API discovery, API management, API security, CISO, Cloud Security, cyberattacks, DEVOPS, owasp, waf, Web Application Security
In today's complex digital landscape, the security of APIs has become paramount. As we move into 2024, it's essential to stay ahead of the evolving API security threats and vulnerabilities. The upcoming ...
Applying Maslow’s Hierarchy of Needs to Exposure Management
When I think about the broad security problems that Noetic is working to solve, they are typically associated with organizational cyber resilience. Security teams are not looking at Cyber Asset Attack Surface ...
How to Securely Enable Generative AI within the Public Sector
Generative artificial intelligence (AI) has captured the world’s collective attention. Millions of people use GenAI services everyday, and we’ve only just started to discover the impact it could have on our organizations ...