In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Scott Schneider from CyberGRX, a startup in the third-party risk analysis space, about best practices and tips for CSOs when working on a risk analysis plan with third party vendors.
In the latest episode of Security Sessions, CSO Editor-in-chief Joan Goodchild talks about the implications of the Yahoo data breach, in which up to 500 million accounts were hacked. Joining Goodchild in the discussion is Kevin O'Brien, CEO and founder of GreatHorn, who offers advice to CSOs and other IT security leaders on ways to learn from this particular breach.
“Most companies are simply not designed to survive. They become successful on the basis of one big idea or breakthrough product,” says CEO Mike Walsh of Tomorrow, a global consultancy that helps design 21st century businesses. The companies that will thrive in the near future are the ones not only embracing change but breaking the rules. Learn how to leverage disruptive innovation, solve business problems with social networks and apply “the new lean IT mindset” to sharpen your focus on how future customers will think, talk and transact.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Michael Bruemmer, vice president at Experian Data Breach Resolution, about a recent survey that said companies are unprepared to stop employee-caused data breaches.
Computerworld, CSO and CIO surveyed 287 business and IT leaders on the state of security in their organization. Here's what they had to say (it ain't always pretty...).
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild talks with Bill Rosenthal, CEO of Logical Operations, about the benefits of tiered security training for IT staff members, not just those with 'security' in their title.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Bill Rosenthal, CEO of Logical Operations, about what's missing in many security awareness training programs that enterprises often deploy (if they're doing them at all).
At the DEFCON hacking conference's Lockpick Village, CSO's Steve Ragan chats with Austin Appel (aka Scorche), from TOOOL, about physical locks, lockpicking and risk management associated with locks.
IDG editors and writers Steve Ragan (CSO), Fahmida Rashid (InfoWorld) and Lucian Constantin (IDG News Service) offer their impressions of this year's Black Hat security conference.
At the Black Hat conference in Las Vegas, CSO’s Steve Ragan chats with Itzik Kotler, CTO and co-founder of SafeBreach, about why many companies end up failing in their security risk assessments, as well as how some companies are tackling these failures to improve their overall security.
At the Black Hat conference in Las Vegas, CSO’s Steve Ragan talks with Stephanie Carruthers, owner of Snow Offensive Security, about why business email compromise (aka CEO fraud) works so well against companies. She also discusses several tricks that phishers will use to gain trust among corporate employees when preparing for an attack.
At the Black Hat conference in Las Vegas, CSO’s Steve Ragan chats with Steven Grossman of Bay Dynamics about how companies can survive the avalanche of information security hype and buzzwords when speaking with vendors who are promising everything.
At the Black Hat conference in Las Vegas, CSO's Steve Ragan speaks with Israel Barak, CISO at Cybereason, about the commoditization of cybercrime, the market for compromised servers and endpoints, and what makes one target more valuable than another.
At the Black Hat convention in Las Vegas, CSO’s Steve Ragan sits down with Lior Div, CEO and co-founder of Cybereason, about threat actors, their methods and motives. Instead of worrying about nation-state hackers like China or Russia, Div argues that companies prepare for low-level attacks that can escalate to larger ones, because the cost of entry for many of these attacks are constantly getting lower.