Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 12 - From assumptions to accountability: A CISO's take on cloud risk

What does “secure by default” really mean—and is it enough? In this episode of CyberArk’s Security Matters, host David Puner sits down with Scott Barronton, Chief Information Security Officer (CISO) at Diebold Nixdorf, to explore the often-overlooked risks of cloud default settings and how assumptions can lead to vulnerabilities.

Ep 3: CISOs hate their security tools

Sumo Logic’s 2025 Security Operations Insights report surveyed 500 IT and security leaders from enterprise organizations to uncover what’s really happening inside today’s SOCs. Join security experts Adam White, David Girvin, and Zoe Hawkins as they break down the top findings from the report and shed light on what every analyst and CISO has felt for years: the system needs a reset.

Mastering the Cyber Incident Response Playbook: A CISO's Guide to Readiness and Resilience

In today’s volatile cyber landscape, having a cyber incident response playbook is not a luxury— it’s a necessity. For CISOs and IT leaders across industries like healthcare, BFSI, public sector, and telecommunications, a well-crafted playbook is the backbone of organizational resilience. It empowers teams to respond effectively, mitigate damage, and recover swiftly from breaches.

Leveraging AI to reduce cybersecurity costs and risks: A CISO's guide

In this article Chief Information Security Officers (CISOs) face a dual imperative in the digital landscape of today: safeguarding their organizations from an ever-evolving threat landscape while managing escalating security costs. Artificial Intelligence (AI) offers transformative potential in meeting these challenges by automating threat detection, streamlining compliance, and optimizing resource allocation.

How CISOs are using AI to automate risk assessments in 2025

In this article In 2025, the role of the Chief Information Security Officer (CISO) and compliance leadership has become even more critical in ensuring that risk assessments are not only comprehensive but also agile and adaptive. Artificial Intelligence (AI) has emerged as a transformative force in cybersecurity, enabling risk assessments to be automated, more accurate, and proactive.

Dev Platform Breaches: How GitHub, Jira & Confluence Exposed Mercedes, Apple, Disney & Others

Welcome to the DevOps multiverse. Here, code is currency, while platforms like GitHub, Jira, and Confluence power critical infrastructure. Here, even the smallest misstep can trigger a chain reaction measured in gigabytes of leaked data, thousands of compromised credentials, and millions of dollars in financial losses, not to mention reputational damage. These risks aren’t theoretical.

CISO Alert: Lessons from McDonald's Chatbot Breach

In June 2025, a disturbing security failure surfaced involving McDonald’s AI-powered hiring assistant, Olivia, operated by Paradox.ai. The platform, designed to screen job applicants via chatbot, exposed the personal information of over 64 million people. That included names, contact info, shift preferences, and even chat transcripts. The root cause? A combination of missteps that highlight the growing risk of insecure APIs in modern, AI-driven systems.

Understanding the CISO: Role, skills, and security impact

In the face of increasingly sophisticated cyber threats, the chief information security officer, or CISO, is responsible for ensuring the organization's data is secure. CISOs ensure that proper security strategies, policies, and technologies are working to meet their goals of mitigating risk, maintaining regulatory compliance, and upholding customer trust. A CISO helps align security initiatives with business goals, enabling growth while minimizing disruptions and vulnerabilities.

Identity security at inception: A CISO's guide to proactive protection

Modern enterprises are facing an identity explosion. Fueled by cloud adoption, DevOps acceleration, and now agentic AI, the number of human and machine identities is growing faster than most organizations can manage. According to the CyberArk 2025 Identity Security Landscape, 9 out of 10 organizations report a successful identity-centric breach, with relentless and sophisticated bad actors continuing to target identities. Machine identities now outnumber human identities by an astonishing 82:1.