CISO Talk
Closing the False Positives Gap for SOC Efficiency
Eliminating false positives can remarkably enhance security operations center (SOC) efficiency and cost-effectiveness ...
Security Boulevard
Five Unintended Consequences of the New SEC Cybersecurity Disclosure Rule
The SEC's recent regulatory compliance mandate regarding breach disclosures is having some unintended consequences ...
Security Boulevard
What the Charges Against the SolarWinds CISO Mean for Security in 2024
The indictment of the SolarWinds CISO by the SEC served as a harsh wake-up call to the corporate world ...
Security Boulevard
SolarWinds CISO Sued for Fraud by US SEC
Richi Jennings | | CISO, CISO duties, CISO Incompetency, CISO reporting structure, SB Blogwatch, SEC, Securities and Exchange Commission, SolarWinds, SolarWinds Orion Supply Chain, SolarWinds Vulnerability, solarwinds123, SolarWindsOrion, Sudhakar Ramakrishna, SUNBURST, Sunburst malware, Sunburst Vuln, Timothy Brown, U.S. Securities and Exchange Commission
The password was ‘solarwinds123’: SUNBURST still reverberates as SolarWinds CISO Timothy Brown co-defends SEC lawsuit ...
Security Boulevard
How to Talk So Your CISO Will Listen
To communicate effectively with your CISO, you’ll need to speak their language. Here's how you can do that ...
Security Boulevard
What CISOs Need to Know About Residential Proxy Networks
If residential proxy networks are not already on the CISO’s radar, 2023 will be the year they will need to focus on them significantly. What is a residential proxy network, and why ...
Security Boulevard
Is Cybersecurity Having an Identity Crisis?
There has never been a better time to get into cybersecurity, or a worse one. The industry is crying out for professional skills but is also foundering in its efforts to retain ...
Security Boulevard
Adventures in Software Audits, Part Three: The Paradigm Battle
John Gary Maynard III | | audit disputes, audit resolution, commercial dispute, Licensing agreements, sales transaction paradigm, Software audits
In the third of this three-part series, we discuss how the 'sales transaction paradigm' can impact a software audit ...
Security Boulevard
A Policy of All Privileged Accounts – Overkill or Common Sense?
An attacker accessing a privileged account doesn’t begin with a root or administrator account. An attack on a privileged account usually starts with the theft of an average user’s credentials. Passwords are ...
Security Boulevard
Considering the Cost of Failure in Security Operations
How do you measure the cost of failure? This was a question posed by SecureIQLab’s VP of Research and Corporate Relations, David Ellis, and senior analyst Randy Abrams, during a conversation at ...
Security Boulevard