Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why CISOs Need to Automate Security, Privacy, and AI Risk Assessments - Now

CISOs face a growing challenge: securing critical assets while keeping pace with evolving cyber threats, AI risks, and increasing regulatory demands. The irony? Despite investing millions in security tools, many organizations still lack confidence that their applications, data, and infrastructure consistently meet security, privacy, and AI governance requirements. Traditional risk assessment methods – like annual audits and spreadsheet-based workflows—are no longer enough.

AI Security is API Security: What CISOs and CIOs Need to Know

Just when CIOs and CISOs thought they were getting a grip on API security, AI came along and shook things up. In the past few years, a huge number of organizations have adopted AI, realizing innumerable productivity, operational, and efficiency benefits. However, they’re also having to deal with unprecedented API security challenges. Wallarm’s Annual 2025 API ThreatStats Report reveals a staggering 1,025% year-on-year increase in AI-related API vulnerabilities.

How CISOs Can Build a Cybersecurity-First Culture

Creating an enterprise security-first culture is one of the most impactful things a CISO can do to protect their organization. Sure, high-tech solutions and fancy tools are important, but they are largely ineffective when staff are unable or unwilling to play their part in preventing, identifying, and reporting security incidents. However, in the quest to develop a positive cybersecurity culture, many Chief Information Security Officers (CISOs) inadvertently create a toxic environment.

The Cost of Being a CISO Part 2: Ethics, Leadership and Strategic Impact

Welcome back to Razorwire! I'm your host, Jim, and in this second part of our CISO Dilemmas series, we welcome back security experts Oliver Rochford and Richard Cassidy. Moving beyond the challenges covered in part one, this episode explores the rewarding aspects of the role while taking a frank look at the ethical issues security leaders regularly face. The guests share personal experiences and practical actions for transitioning from technical expertise to strategic leadership, building effective teams and managing relationships across the business.