CSO
Traits of a Modern CISO
June 29 by Lisa MorganInformation security has morphed from being an unsexy expense to a necessary capability. Without it, organizations remain woefully unprotected against the growing threats of hackers, hacktivists, and...
A How To Guide To Secure Access Service Edge (SASE)
November 10 by CSHub.com Editorial StaffUnplanned circumstances underscored the need for zero trust mechanisms at the edge and comprehensive cloud-based security options to protect data, intellectual property, other enterprise assets and re...
Implementing A Layered Approach To Phishing And Whaling
May 19 by Seth AdlerDuring this digital summit panel, Suresh Chawdhary, head of security & privacy for Nokia, stresses the importance of a layered, multi-pronged cyber security approach to best protect from phishing and...
RSAC 2020 Watchlist: Effective CISO Communications And Maturing Data Privacy
February 21 by Jeff OrrThis year will witness the operationalization of enterprise data privacy with concerted efforts around frameworks and automation. The need for human communications will also be realized. Read more abo...
Cyber Security Hub Digital Summit Prepares InfoSec Leaders For Resiliency
August 15 by Jeff OrrEvery year, cyber-attacks grow in both frequency and sophistication. As more and more CISOs become involved in the corporate strategy discussion, the Cyber Security Digital Summit examines what more c...
Why Is The NIST Framework Important?
March 14 by Alarice RajagopalSpecial guest Ben Brooks, Special Intelligence and Electronic Warfare Veteran and current Vice President of Cyber Security consulting firm Beryllium joined George Rettas, president and CEO of Task For...
Security Execs Talk Facebook CSO, ‘Single Pane’ & Strategy
September 11 by Dan GundermanOn Sept. 10, “Task Force 7 Radio” show host George Rettas was joined by guest co-host and BitGo Chief Security Officer (CSO), Tom Pageler. Topics of discussion ranged from cyber spend, to security pre...
CISO 2.0: Tips To Succeed, Lessons Learned
July 19 by Dan GundermanWe caught up with a few CISOs who offered wisdom on the role, based on their unique experiences. These helpful tips come from years in the cyber-trenches, but result from clear wins and, in all likeli...
LOB, Security Teams Must Be On Same Page For Cyber Success
May 31 by Dan GundermanAs cyber security realizes new heights within the enterprise, its relationship with lines of business (LOB) must still improve. And it's mutual.
Palo Alto Networks CSO Talks Risk Metrics, Algorithms & Automation
May 15 by Dan GundermanOn the May 14 episode of “Task Force 7 Radio,” host George Rettas sat down with Palo Alto Networks CSO, Rick Howard, to outline risk management, the security kill-chain and much more.
Encryption & Controls: Reducing Insider Threats In Healthcare
April 04 by Dan GundermanThe visible and regulated healthcare industry remains a far-too-targeted space for cyber-attacks, and the "insider" threat continues to be an uphill climb for security teams.
Chatbots: Phase 1 Of AI Innovation In Cyber Security?
March 14 by Dan GundermanWhile artificial intelligence (AI) is no doubt appealing to the enterprise – including its initial "chat-bot" stage – it is accompanied by its share of challenges.