Security Current


The CISOs Report, Perspectives, Challenges and Plans for 2022 and Beyond

Posted on: 10 May 2022

The CISOs Report, Perspectives, Challenges and Plans for 2022 and Beyond, reveals that Chief Information Security Officers (CISOs) are grappling with a wide range of risks and challenges, especially linked to accelerating utilization of technologies like cloud-based applications and the use of Application Programming Interfaces (APIs). The report is based on a survey of more…

The CISOs Report, Perspectives, Challenges and Plans for 2022 and Beyond

Posted on: 10 May 2022

The CISOs Report, Perspectives, Challenges and Plans for 2022 and Beyond, reveals that Chief Information Security Officers (CISOs) are grappling with a wide range of risks and challenges, especially linked to accelerating utilization of technologies like cloud-based applications and the use of Application Programming Interfaces (APIs). The report is based on a survey of more…

Manish Kalia, CEO and co-founder, Orkus

Posted on: 13 Dec 2018

My job is simple,” says Manish Kalia, co-founder and CEO of cloud cybersecurity firm Orkus. “I have to make sure that the organization is going in the right direction.” The not-so-simple part of the job, however, is defining and refining that long-term vision in an industry that is dynamic and ever-changing. It’s the constant evolution…

Social engineering, ransomware and DDoS top threats to cyber executives in Europe

Posted on: 13 Dec 2018

Education of potential victims remains the most effective defense against social engineering, the European Union’s law enforcement agency Europol says, and cybersecurity executives must strengthen industry-wide cooperation as well as with governments and the rest of the private sector. Other sources of threats among cyber-dependent crimes are ransomware and Distributed Denial of Service Attacks, according…

Increased connectivity to pose higher cyber risks in 2019

Posted on: 07 Dec 2018

CISOs have to watch out for higher security risks in 2019 amid increasing connectivity and greater demand for telecommunication services, The Economist Intelligence Unit said. In a special report called Telecoms in 2019 released last week, the EIU said the rollout of fifth-generation (5G) technology – intended to support the development of a sharing economy,…

Quora implements crisis management playbook to manage major data breach by hackers

Posted on: 04 Dec 2018

Popular question-and-answer website Quora said it believes it has identified the root cause of the hacking of as many as 100 million user accounts as the company quickly dealt with the effects of a major hacking breach. “We’re very sorry for any concern or inconvenience this may cause,” said Quora CEO Adam D’Angelo. Quora sent out emails to its…

Clifford Stokes, Jr. CISO, Florida A&M University

Posted on: 03 Dec 2018

Clifford Stokes Jr., Chief Information Security Officer (CISO) of Florida A&M University, has his cybersecurity strategy all mapped out. He sits down with his supervisor and produces a three-year plan, a two-year plan, a one-year plan. And then he takes the strategy and breaks it down into components and targets. He plans his day equally…

Garrett Smiley, CISO, Serco

Posted on: 22 Nov 2018

Imagine someone running while juggling many different things, hoping he doesn’t drop anything. Serco’s Garrett Smiley says this would be an accurate description of the demands on a CISO. The job has taught him that achieving perfection is next to impossible. “There is always more work than there are people doing work, and the work…

Darren Death on security hygiene, compliance, and tech-related business conversations

Posted on: 21 Nov 2018

Only a few breaches occur because attackers targeted a specific organization using sophisticated methods. About 90% of of problems are caused by failure to maintain IT hygiene. It’s a basic, foundational step that is often overlooked but could have disastrous consequences for the business. Darren Death, the CISO of ASRC Federal, talked to Task Force…

Stories, not resumes: Breaking educational and other barriers in cybersecurity

Posted on: 03 Nov 2018

by Kyle F. Kennedy When you search for images under the key word “cybersecurity,” a familiar shot always turns up: a guy wearing a hoodie, operating in a dark room, fingers on a keyboard. I’d like to replace that image with…anything. To be a cybersecurity professional, you can be anything. And anyone. We’ve heard the…