CISO Outlook articles

Pega Hires New CISO

Pega Hires New CISO

Newly created role will help ensure security best practices for Pega and its clients Pegasystems has announced that Carlos Fuentes has joined the company as its chief information security officer (CISO). In this newly created role, Fuentes will be responsible for comprehensive information security standards and policies, based out of the company’s Cambridge, Mass. headquarters.

Having a password strategy as an essential cybersecurity effort

Short, simple passwords take fewer resources for hackers to compromise. According to the Verizon Data Breach Investigations Report, 81% of breaches leveraged either stolen and/or weak passwords. That problem is compounded because one of the biggest risks to data security is the reuse of passwords across accounts. CIO AXIS talked to Rajesh Maurya, Regional Vice

64% of Organizations Have Suffered Insider Threat-Caused Breaches: BeyondTrust Threat Report

BeyondTrust’s annual Privileged Access Threat Report highlights that greater privileged access visibility and improved integrations are vital to tackling the modern threat landscape BeyondTrust has released the 2019 Privileged Access Threat Report. In its fourth edition, the global survey explores the visibility, control, and management that IT organisations in the U.S., APAC, Europe and the

Cybercriminals Flock to Apps Where the Users Are and When Users Are Online

Fortinet threat landscape report reveals nearly 60% of threats shared at least one domain, indicating the majority of botnets leverage established infrastructure Fortinet has announced the findings of its latest quarterly Global Threat Landscape Report. The research reveals that cybercriminals continue to evolve the sophistication of their attack methods, from tailored ransomware and custom coding

Record level of vulnerabilities sparks cybersecurity innovation among global enterprises

Dimension Data has revealed exclusive findings from its Executive Guide to NTT Security’s 2019 Global Threat Intelligence Report, concerning the cybersecurity maturity of organisations across a number of markets and sectors. Globally, the average cybersecurity maturity rating stands at a worrying 1.45 out of 5 – a score determined by an organisation’s holistic approach to

Fortinet Unveils Industry’s First SD-WAN ASIC to Accelerate and Secure the WAN Edge

Fortinet has announced new secure SD-WAN offerings, including the industry’s first SD-WAN ASIC, to further enable organizations to implement security-driven networking. The offerings include: the industry’s first SoC4 SD-WAN ASIC; FortiGate 100F Appliance, delivering 10 times faster performance, new SD-WAN features within FortiOS 6.2; Fortinet 360 protection services. Use Case #1: Digital Transformation at the

Major Bot Threats: CISOs recognise your Enemy

By Nikhil Taneja, Managing Director-India, SAARC & Middle East, Radware According to a study by the Ponemon Institute in December 2018, bots comprised over 52% of all Internet traffic. While ‘good’ bots discreetly index websites, fetch information and content, and perform useful tasks for consumers and businesses, ‘bad’ bots have become a primary and growing

Twitter Fixes Bug that lets Unauthorized Apps Get Access to Direct Messages

Back in 2013, the OAuth keys and secrets that official Twitter apps use to access users’ Twitter accounts were disclosed in a post to Github… a leak that meant that authors didn’t need to get their app approved by Twitter to access the Twitter API. Years later, the chickens are still coming home to roost:

Thanksgiving Day Botnet: November 2018’s Most Wanted Malware

Check Point’s latest Global Threat Index reveals the Emotet botnet rising up the top malware list in November as a result of multiple campaigns; Coinhive remains at top position for 12th consecutive month. Check Point has published its latest Global Threat Index for November 2018. The index reveals that the Emotet botnet has entered the

Online Shoppers More Vulnerable to SPAM as the Holidays Inch Closer

New research from cyber security provider F-Secure points to spam as an attack vector to watch out for this holiday season. Spam campaigns disguised as delivery notifications or online shopping invoices have been popular with cyber criminals all year long, and researchers say these tactics can prove even more effective around the holidays. F-Secure’s research

Top