CISO metaverse eCatcher service desk virtual desktop

Engagement, Innovation Among Top Traits of Successful CISOs

Top-performing CISOs stand out for their commitment to personal and professional growth, according to a recent Gartner survey ...
Security Boulevard
CISOs Zoom burnout

How CISOs Can Foster Positive Mental Health in Cybersecurity

CISOs work in a stressful field that changes on a daily, sometimes hourly basis. The weight of the world is on their shoulders—externally, because of security threats to their organizations, and internally, ...
Security Boulevard
mobile app security

Rethinking the Status Quo of Mobile App Security

Most executives view mobile applications as a crucial component of their organization’s business strategy. Mobile apps help companies generate revenue, engage with customers and create new business opportunities. With mobile apps accounting ...
Security Boulevard
zero-trust CISO app monitoring SPA AppSec Application Security Management with Sqreen's Pierre Betouin

CISOs Clamor for Better App Monitoring Tools

In the history of IT security, the sector’s traditional tools and solutions have rarely appeared as inadequate as they do now. Over the past four years, the multitude of ransomware attacks resulted ...
Security Boulevard
cybersecurity ask chloé career project management business security

Survey Reveals Limits of CISOs’ Management Experience

A global survey from recruitment firm Marlin Hawk that polled 470 CISOs at organizations with more than 10,000 employees found nearly half (45%) have been in their current role for two years ...
Security Boulevard

Why Cybersecurity Needs to be a Part of Your ESG

What is an ESG? Environmental, social, and corporate governance (ESG) documentation is a way to visualize and evaluate how an organization is working for the betterment of social goals and how that ...
Noname StackHawk APIs security APIs Checkmarx access point

Cybersecurity Requires Decisive Action

Corporate executives have a responsibility to ensure long-term positive outcomes for the companies they lead. One way to accomplish this is by minimizing corporate risk and protecting assets through proactive and innovative ...
Security Boulevard
How to stop your exposed API business logic from being breached

How to stop your exposed API business logic from being breached

This article was originally published in The Hacker News ...
Is your current approach to API security cutting it?

Is your current approach to API security cutting it?

| | API security, CISOs, Cybersecurity
There’s no way around it -- 2020 was the year of digital transformation. Recent research from IDC shows that spending on digital transformation was poised to grow by 10.4% in 2020 and ...
The SolarWinds Breach: It’s time for a Zero Trust approach to B2B partners

The SolarWinds Breach: It’s time for a Zero Trust approach to B2B partners

The SolarWinds breach wasn’t an ordinary attack. It was a highly sophisticated nation-state level attack that employed connected IT supply chains to infect thousands of organizations at once by compromising a service ...