Mike Hamilton, founder and CISO of CI Security, followed an unusual path that led him to a career in cybersecurity. He says those who, like him, lack a formal education in security can build successful CISO careers.
Her title says "information security," but Radian CISO Donna Ross considers herself more of a security risk officer. It's an important distinction that drives her approach to technology, leadership and communicating with senior leadership.
Flavio Aggio, CISO of the World Health Organization, has had a long career across many sectors. He understands supply chain risk, and he sees the SolarWinds hack as "resumption of a very old attack - in new packaging." He offers insights on mitigating this and other cybersecurity risks.
Glauco Sampaio comes from a technology background. But as CISO as well as privacy and fraud prevention officer at Cielo, a Brazilian payment card processor, he focuses on how to marry technology with business risk - and how to share his vision with business executives.
Pre-IPO investments in Israeli cybersecurity firms totaled $2.9 billion in 2020, up 70% from the previous year, and exports of products and services increased as well, according to the Israel National Cyber Directorate. Security experts offer insights on the reasons behind the growth.
Three CISOs offer real-world insights on addressing the challenges involved in implementing a "zero trust" framework to enhance security in an era when so many remote employees are accessing applications and data in the cloud as well as within internal networks.
Even the best-laid plans can go astray… That’s why we stand ready as ever to help you get your certification goals back on track for success.
Every (ISC)² member started out by committing to and passing one of our certification exams. No matter which certification you choose, you’ll find everything you...
Small businesses have been disproportionately affected by hackers in recent months. To aid in countering the threat, Mastercard has launched a cybersecurity education effort targeting this market segment. Paul Trueman, a senior vice president Mastercard, explains the “Trust Center” initiative.
Organizations continue to rapidly migrate business applications from datacenters to the cloud, utilizing new technologies such as serverless, containers, and machine learning to benefit from increased efficiency, better scalability, and faster deployments from cloud computing.
The 2020 AWS Cloud Security Report is...
The evolution of IaaS (Infrastructure as a Service) has introduced a new spectrum of benefits for enterprises. The speed, scalability, and ease of set up have made the virtualized computing services of public cloud extremely attractive to enterprises.
Unfortunately, the very nature of these dynamic, distributed, and...
It's one thing to plan for a remote workforce. Quite another when you suddenly have to deploy and support it - at 100%. Martin Mazor of Entertainment Partners discusses the vital role of identity in his enterprise's unique business.
Controlling, monitoring, and auditing privileges and privileged access—for employees, vendors,
systems, applications, IoT, and everything else that touches your IT environments is essential for
protecting against both external and internal threat vectors, and for meeting a growing list of
Some people run from change. Arun DeSouza of Nexteer Automotive runs toward it. "Now is my time," says the veteran chief information security and privacy officer, who shares his leadership and technology insights in this exclusive interview.