Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The CISO's API Security Paradox: High Priority, Huge Blind Spots

In today’s digital-first world, APIs serve as the core infrastructure of modern business. They power mobile applications, facilitate critical cloud integrations, and support digital transformation initiatives. It's therefore understandable that 73% of CISOs consider API security a top or critical concern. However, a recent survey of 300 security leaders uncovers a troubling paradox: a large gap between awareness and action.

The quantum-AI collision: What CISOs must do now to stay ahead

Technology is moving at the speed of light, and two forces—quantum computing and AI agents—are poised to shake up cybersecurity. We’re not talking about some far-off future; this is happening now. The message for CISOs and security leaders is simple: If you’re not preparing now, you’re already behind. As we say in Brazil, “Melhor prevenir do que remediar” or “better to prevent than remediate.”

What Keeps CIOs Up at Night: Five Key Concerns and How SASE Brings Peace of Mind

Over the past nine years in the SASE business, I’ve had the privilege of speaking with hundreds of IT leaders—CIOs, CISOs, and IT executives. Through these conversations, I’ve found that five main concerns consistently keep them up at night. This blog aims to share those insights and highlight how I’ve seen Cato Networks’ SASE platform help address these challenges, allowing IT leaders to sleep a little easier.

Unlock the CISO Secrets: From Developers to the Boardroom! #podcast #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

CISOs Brace for a Wave of AI-Powered, Domain-Based Cyber Threats

Domain-name system (DNS)- based cyber attacks are becoming increasingly complex, and AI will only make managing them even more challenging. According to a recent report, Chief Information Security Officers (CISOs) anticipate a tumultuous season of cyber threats, with low confidence in their abilities to defend against them effectively.

CISO Guide to Machine Identity Lifecycle Management: What CISOs Need to Know

Machine identity lifecycle management has evolved beyond a technical implementation challenge to become a fundamental component of enterprise risk management and digital transformation strategy. As a core element of a modern cybersecurity strategy, machine identity management ensures that organizations can effectively protect their digital assets and adapt to evolving threats.

Proving the ROI of Vulnerability Assessments: A CISO Guide

In cybersecurity, the value of vulnerability assessments (VA) is widely acknowledged but not always quantified. For many decision-makers, “just preventing an attack” isn’t a strong enough business case. They want to know: What is the return on investment (ROI)? How does this investment contribute to the bottom-line, reduce business risk, or improve operational performance?

EP 9 - J&J's former CISO on trust, identity, and the future of cybersecurity

In this episode of Security Matters, host David Puner sits down with Marene Allison, former Chief Information Security Officer (CISO) of Johnson & Johnson, for a candid and wide-ranging conversation on trust, identity, and leadership in cybersecurity. From securing global vaccine supply chains during the COVID-19 pandemic to navigating the rise of AI and machine identities, Marene shares hard-earned insights from her decades-long career in national security and the private sector.