Matt Gordon-Smith has more than 25 years of information security experience and has led security programs. He says networking and relationship-building are critical to career success, but many aspiring CISOs face a major obstacle to interacting with other leaders: imposter syndrome.
Jana Partners has raised its stake in cybersecurity vendor Rapid7 to 13% and is pushing for the company to consider selling itself. The activist investor teamed up with Cannae Holdings and is engaged in discussions with Rapid7's management to explore operational improvements and board restructuring.
Banks, insurance and other financial services institutions are experiencing a wave of mergers and acquisitions. This activity comes with an exponential rise in identities that need to be secured. Newly acquired companies often lack visibility into all their identities resulting in overprovisioned access.
You can...
Picus Security has received $45 million in funding led by Riverwood Capital. The investment will accelerate product development in exposure management, including attack surface management and automated pen testing. The company plans to expand further in the Americas, targeting key growth areas.
In cybersecurity, it is easy to fall into the trap of viewing cyberattacks as purely technical failures, but they represent only a portion of the broader picture. We need to ensure that the operational aspects of cybersecurity are a principal component of an organization's defense strategy.
Technology and security leaders convened at CIO.inc's Cloud and AI Innovation Summit to discuss cloud-driven innovation and AI adoption strategies. The event explored the advantages and risks of cloud and AI adoption and how organizations are using platforms to fuel growth.
Preparing healthcare organizations to respond to and rebound from a disruptive ransomware attack is akin to implementing a "12-step program," said Dr. Eric Liederman, CEO of consultancy CyberSolutionsMD and recently retired long-serving director of medical informatics at Kaiser Permanente.
Indian businesses are facing significant challenges that hinder their ability to adopt preventive cyber defence strategies. People, process and technology issues collectively impede organisations from effectively reducing cyber risk.
In this latest Survey by Forrester Consulting, they shed light on the obstacles...
As per Gartner by 2026, organizations prioritizing their security investments, based on a continuous threat exposure management program, will realize a two-third reduction in breaches.
Check out this latest report from Gartner on the top strategic technology trends for 2024 and learn about exposure management, and...
France’s cyber defense agency teamed up with governments and security experts from across the globe to identify and mitigate a historic level of both physical and cyber threats following years of preparation, experts tell Information Security Media Group.
Mimecast's acquisition of Aware bolsters its human risk management by adding AI and natural language processing capabilities for collaboration tools. The deal enhances security across communication platforms, addressing insider threats and compliance issues while boosting Mimecast's market presence.
The intersection of cyber supply chain security and third/fourth-party risk management presents significant challenges for CISOs. Here's how to take a proactive, comprehensive approach to cyber supply chain risk management to protect critical assets and enhance resilience against evolving threats.
Most hospitals prioritize cybersecurity but often lack the necessary resources to comply with these goals. The question becomes not about the practices, but the potential barriers to implementation, according to John Riggi at the American Hospital Association.
Financial services companies are managing tens of thousands of identities which, at scale, can be challenging to quickly manage and secure access for employees as they join, transfer departments, or leave a company. 77% state these problems are exacerbated by a rapid influx of identities as a result of mergers and...
An M&A due diligence process must include a comprehensive cybersecurity risk assessment, including all assets, threats, vulnerabilities and control measures, said Bradley Schaufenbuel, vice president and CISO at payroll and HR solution company Paychex.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.