CISO
Cybersecurity Insights with Contrast CISO David Lindner | 10/13
Insight #1 Google is now defaulting to the use of passkeys for authentication. This is a huge step in increasing the strength of the authentication mechanism out of the box for users, ...
PwC Survey: Boards of Directors Still Challenged by Cybersecurity
A survey of 645 boards of directors conducted by PwC found nearly half (49%) still viewed cybersecurity as a challenge ...
Cybersecurity Insights with Contrast CISO David Lindner | 10/6
Insight #1 AI voice cloning is a problem: It’s reportedly taken the top spot in scam trends, particularly targeting seniors. “My voice is my passport” can no longer be a thing. ...
How to Talk So Your CISO Will Listen
To communicate effectively with your CISO, you’ll need to speak their language. Here's how you can do that ...
Cybersecurity Insights with Contrast CISO David Lindner | 9/29
Insight #1 For years — since 2018 — the National Institute of Standards and Technology (NIST) has said that password length trumps password complexity requirements. Now LastPass is forcing users into choosing ...
‘All of Sony’ Hacked, Claims Ransomed.vc Group
Hackers Play in Sony’s World: If true, Sony might have to push the RESET button (again) ...
The Changing Role of the CISO with Ryan Davis, Chief Information Security Officer at NS1
In this episode Ryan Davis, Chief Information Security Officer at NS1, speaks with host Tom Eston about the changing role of the CISO, acquisitions, what the biggest challenges are, and Ryan’s advice ...
The CISO’s Three-Point Checklist for Maximizing Cybersecurity ROI
In this blog, we present the CISO’s Checklist for Maximizing Cybersecurity ROI, providing essential criteria to navigate this complex terrain effectively. Explore how aligning security strategies with business objectives, adopting continuous threat ...
CISOs: Are You Applying NIST / CISA Standards to ALL Data Including the Cloud?
Security leaders want to solve problems identifying and understanding anomalies or account access behaviors by correlating anomalous behaviors of specific accounts with other parameters like geography or ingress and egress points, but ...
Key Insights for CISOs from Recent SEBI Guidelines
The role of Chief Information Security Officers (CISOs) has evolved with changing cyber security norms and their impacts. This has been beyond simply safeguarding data to strengthening the very foundation of the ...