cyber

How Gmail accounts are hacked… Google research reveals the ways 

“What we learned from the research proved to be immediately useful. We applied its insights to our existing protections and secured 67 million Google accounts before they were abused.” – Google 2017 The three greatest threats to users According to Google, phishing attacks – which in case you don’t know are a method by which […]

How Gmail accounts are hacked… Google research reveals the ways  Read More »

VMware’s big-ticket shopping spree sharpens focus on Kubernetes and cybersecurity

When he was head coach of the NFL’s New England Patriots in the 1990s, Bill Parcells was once asked if he thought he should be involved in acquiring players for his team. “If they want you to cook the dinner, at least they ought to let you shop for some of the groceries,” Parcells said.

VMware’s big-ticket shopping spree sharpens focus on Kubernetes and cybersecurity Read More »

The First 100 Days of the New CISO: Expectations vs. Reality

The situation the new CISO finds on arrival is often different to what they were expecting, but who’s to blame? A painfully recurrent complaint among Chief Information Security Officers (CISO) is the disconnect between what they were promised during the recruitment process, and the actual situation they find upon starting the job. Indeed, it is

The First 100 Days of the New CISO: Expectations vs. Reality Read More »

How to Avoid the “Curse of Firefighting”?

Constant firefighting downgrades the role and the CISO must fight to avoid its gravitational pull With regards to many other C-level roles, the Chief Information Security Officer (CISO) position is a fairly recent creation for many organisations. Although it started to emerge over 15 years ago, it has been spurred further recently by growing concerns

How to Avoid the “Curse of Firefighting”? Read More »

The CISO and the Business

Keep appointing pure technologists in CISO roles and you’ll never win The Wannacry ransomware attack that affected so many large firms in May 2017 led to a number of animated discussions amongst InfoSec communities. The corrective patch (fixing the vulnerability targeted by the malware) was out since March for supported systems and many firms were

The CISO and the Business Read More »

?
WP Twitter Auto Publish Powered By : XYZScripts.com