Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISO

Hello CISO - Episode 8: Common Sense Security Policies and Bullshit Ones

The best policies for security aren’t always the policies that end up in the company security manual. Why? In this episode, Troy explores the difference between good security policies and CYA security policies… and how to close the gap between the two. Hello CISO is a collaboration between Troy Hunt and the people who build the world's most trusted enterprise password manager. To learn more, visit 1Password.com/business, and don’t forget to subscribe to be notified of new episodes.

36% of CISOs see the shortage of skilled workers as their key cybersecurity challenge

According to Cybersecurity Ventures, it is estimated that 3.5 million security analyst positions remain unfilled. It’s no surprise, then, that more than a third of CISOs find the skills shortage to be their primary challenge, according to the ThoughtLab study Cybersecurity Solutions for a Riskier World.

How CISOs Can Transform their SOC: Technological and Economic Considerations

Our SOC Performance Report found that it takes an average of seven months to fill open SOC positions, and 55% of those doing the hiring are struggling to find qualified staff. As a result, SOC resources are strained, putting the team at risk for fatigue and burnout, which can cause them to miss critical alerts. Research has shown this is a widespread issue, too, as most SOCs waste an average of 10,000 hours annually validating unreliable and incorrect alerts.

How a vCISO can help you with ISO 27001 compliance

Information security is a major concern for many businesses for two reasons. Firstly is persistent threat of cyber attacks and data breaches. That’s why strong information security is a requirement to ensure the security of business and personal data. Secondly, it’s a key business enabler, with a push in recent times for all parts of a supply chain to become ISO 27001 certified.

CISO Interview Series: Brian Haugli

It’s a rare treat when you get the opportunity to speak with someone who has worked as an ethical hacker, has also worked in top secret military settings, and then transferred to the private sector, rising to the highest cybersecurity level in the corporate chain. We had the opportunity to speak with Brian Haugli, CEO of SideChannel. Brian is also the author of a book about the NIST Cybersecurity Framework.

5 Reasons Why CISOs are Investing in API Security

Digital transformation has ushered in a new era of devices, applications and online services. And though apps get most of the credit, application programming interfaces, or APIs, provide the underlying connectivity between software and services that make it all possible. As any developer will confirm, APIs enable organizations to streamline workflows, develop new ways to support customers, and pursue new avenues to drive profit.

Ask a CISO Series: Part 1 - What will be the top cybersecurity threats in 2023?

As we look towards 2023, it is important to gain insight from top cybersecurity experts on the emerging threats and trends in the field. In this interview series, we spoke with four leading CISOs in order to gain their perspective on the threats, trends, and their personal goals as CISOs in 2023. Meet our panel of distinguished CISOs who will impart their foresight and guidance on the future of cybersecurity in 2023. ‍ ‍

Hello CISO - Episode 6: Managed Devices and Networks with Working from Home

IT isn't only about – or even primarily about – technology itself. IT is about people. Nowhere is that more apparent than in our homes, which is where many of us now conduct our work. How can IT protect a fleet of devices in multiple locations and across multiple networks? Find out in this episode of Hello CISO.