Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CSPM importance for CISOs. What security issues can be prevented\defended with CSPM?

Cloud Security is a broad domain with many different aspects, some of them human. Even the most sophisticated and secure systems can be jeopardized by human elements such as mistakes and miscalculations. Many organizations are susceptible to such dangers, especially during critical tech configurations and transfers.

Secure your unprotected assets with Security Center: quick view for CISOs

We understand that one of the significant hurdles faced by our customers, especially larger organizations, is obtaining a clear view of the deployment of Cloudflare services throughout their vast and complex infrastructures. The question isn't just whether Cloudflare is deployed, but whether it's fully optimized across every asset and service. Addressing this challenge head-on, we're rolling out a new feature set designed to provide better visibility and control over your security posture.

Torq talks to Abnormal CISO, Mike Britton

Torq talks to Abnormal CISO, Mike Britton Mike Britton, CISO at Abnormal Security spoke to our Sr. Social Media Manager, Brittney Zec about how Torq Hyperautomation is helping Abnormal Security's SecOps team operate faster and more efficiently. Mike also talks about the ROI that Abnormal Security is seeing with Torq, along with the advice he would give to other security professionals considering adopting hyperautomation.

SEC's Cyber Wake-up Call: The Evolving Role of the CISO (LIVE)

Join us for a LinkedIn Live panel discussion between industry experts Matt Stamper (CEO, Executive Advisors Group LLC), Colleen Lam (General Counsel, Sysdig), and Andrew Thorpe (Partner at Gunderson Dettmer and former Special Council at the SEC), as they dissect the seismic shifts in the cybersecurity landscape post the SEC's updated guidelines and the Solarwinds complaint.
Featured Post

The tension between the CDO and the CISO: The balancing act of data exploitation versus protection

Data is the most valuable resource for the global enterprise. For any company wanting to remain relevant in today's competitive business landscape, data needs to be at the centre of every business decision, allowing the C-suite to review initiatives, make real-time decisions and if necessary reverse actions. A quick response fuelled by real data insights will power and improve the customer experience and product offerings while driving lower prices through better efficiency. Ultimately, this will improve the bottom line and deliver successful outcomes for many organisations.

3 Things CISOs Can Immediately Do with Cato

Wherever you are in your SASE or SSE journey, it can be helpful knowing what other CISOs are doing once they’ve implemented these platforms. Getting started with enhanced security is a lot easier than you might think. With Cato’s security services being delivered from a scalable cloud-native architecture at multiple global points of presence, the value is immediate. In this blog post, we bring the top three things you, as a CISO, can do with Cato.

The CISO's Guide to a Modern GRC Program with Trust Assurance

The position of CISO is not an enviable one. Modern CISOs face enormous challenges like managing the complexity of on-prem and cloud environments, being responsible for the actions of thousands of employees without having authority over them, being perceived as a drag on growth and other resources, and trying to keep up in a compliance and technology landscape that just keeps changing. Oh and budget? Limited and scrutinized.

CISO: Top 10 Trends for 2024

I recently hosted and moderated a distinguished panel of Chief Information Security Officers (CISOs) - Nitin Raina, CISO at ThoughtWorks, Mike Wilkes, former CISO at Marvel and Yogesh Badwe, CSO at Druva. We discussed major trends for 2024 across an array of topics including the evolving threat landscape, recent regulations, data privacy considerations, securing product and critical infrastructure.