UnitedHealth CISO

UnitedHealth Hires Longtime Cybersecurity Executive as CISO

UnitedHealth Group, which is still picking up the pieces after a massive ransomware attack that affected more than 100 million people, hired a new and experienced CISO to replace the previous executive ...
Security Boulevard
PCI DSS Self-Assessment Questionnaires: Choosing the Right Type

PCI DSS Self-Assessment Questionnaires: Choosing the Right Type

If you process credit card payments, you need to prioritize security. One way to guarantee this safety is by complying with Payment Card Industry (PCI) Data Security Standards (DSS) ...
Iams, IAM strategy, security, strategy, CISOs, IAM identity access management GDPR Affects IAM Usage

CISOs Should Be Directing IAM Strategy — Here’s Why 

By placing IAM strategy and enforcement under the CISO’s purview, enterprises can ensure that it is treated as a critical component of the overall security strategy ...
Security Boulevard
How to Reduce Risk From Misconfigured Build Assets

How to Reduce Risk From Misconfigured Build Assets

| | AppSec, Best Practices, CISO, DEVOPS
Get steps to prevent risky misconfigurations in your SDLC.  ...
SEC is Not Accepting Half-Truths

SEC is Not Accepting Half-Truths

| | CISO, Cybersecurity, SEC
 The SEC has fined four major companies for materially misleading investors regarding cyberattacks.Tech in TroubleRegulatory actions have been brought against Unisys, Avaya, Check Point, and Mimecast for their purposeful decisions to not clearly ...
How to evaluate OT security program maturity

How to evaluate OT security program maturity

| | CISO, Incident Response, iot, OT, threats
An OT security program can lead to better resource use, improved security operations, and tangible gains for the security posture of an OT operator. The benefits of running an OT security program ...
SPRS

CISOs Concerned Over Growing Demands of Role

There are growing concerns among chief information security officers (CISOs) about the evolving demands of their role, with 84% advocating for a split into separate technical and business-focused positions. The Trellix and ...
Security Boulevard
Launching a critical infrastructure security program in 4 phases

Launching a critical infrastructure security program in 4 phases

| | CISO, Incident Response, iot, OT, threats
As per the Cybersecurity and Infrastructure Security Agency (CISA), threat actors were still leveraging brute force intrusions, default credentials, and other unsophisticated attack methods to target internet-exposed operational technology and industrial control ...
AI, network, CIOs, data, Auth0

CIOs Sound Alarm on Network Security in AI Era

| | AI, CIO, CISO, IT Security, network, security
The increasing integration of AI and bandwidth-heavy applications is complicating network environments and making them a greater focus for C-suite leaders, according to a report by Extreme Networks ...
Security Boulevard
Simple yet essential cybersecurity strategies for ensuring robust OT security

Simple yet essential cybersecurity strategies for ensuring robust OT security

| | CISO, Incident Response, iot, OT, threats
At the heart of an OT security strategy lies the ability to clearly distinguish IT and OT security. Since both share tech, operational goals, and to some extent an enabling mission, it ...