Cybersecurity Leadership
20.9K views | +0 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

MIT report details new cybersecurity risks

MIT report details new cybersecurity risks | Cybersecurity Leadership | Scoop.it
Cloud misconfigurations, more sophisticated ransomware, and exploitation of vendors are contributing to rising cyberattacks.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

5 Hard Truths About the State of Cloud Security 2024

5 Hard Truths About the State of Cloud Security 2024 | Cybersecurity Leadership | Scoop.it
Dark Reading talks cloud security with John Kindervag, the godfather of zero trust.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cybersecurity fears drive a return to on-premise infrastructure from cloud computing

Cybersecurity fears drive a return to on-premise infrastructure from cloud computing | Cybersecurity Leadership | Scoop.it
After reflecting on their experience, IT leaders found that the most common reasons for cloud repatriation projects were security concerns.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

A proactive and multi-faceted approach is crucial for ensuring cybersecurity in the cloud

A proactive and multi-faceted approach is crucial for ensuring cybersecurity in the cloud | Cybersecurity Leadership | Scoop.it
Create a comprehensive cloud security strategy aligned with your business goals, risks, and resources. Find out more here
No comment yet.
Scooped by JC Gaillard
Scoop.it!

IT security is broken – and it’s my fault

IT security is broken – and it’s my fault | Cybersecurity Leadership | Scoop.it

Schlomo Kramer on why a common operational platform based on SASE can solve the lion’s share of cloud security challenges for companies.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cloud security: The cybersecurity blind spot

Cloud security: The cybersecurity blind spot | Cybersecurity Leadership | Scoop.it
Darktrace chief product officer, Max Heinemeyer, cautions companies about the cybersecurity risk of not securing their cloud data in 2024.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Most cloud moves found rushed as adopters underrate associated risks

Most cloud moves found rushed as adopters underrate associated risks | Cybersecurity Leadership | Scoop.it

A new study on the current state of cloud-native security found that a considerable number of cloud adopters do not understand the security risks of moving legacy applications to the cloud, opening themselves to a number of cloud-based attacks.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The Need for Speed: When Cloud Attacks Take Only 10 Minutes

The Need for Speed: When Cloud Attacks Take Only 10 Minutes | Cybersecurity Leadership | Scoop.it
Security sensors are common in the home for both prevention and response in the event something goes wrong. But in the cloud, have you taken the same approach?
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The 4 Keys to Building Cloud Security Programs That Can Actually Shift Left

The 4 Keys to Building Cloud Security Programs That Can Actually Shift Left | Cybersecurity Leadership | Scoop.it
The 4 best practices to implement true shift-left security. Developers and security teams must unite early in the software development lifecycle.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Designing a Security Strategy for Defending Multicloud Architectures

Designing a Security Strategy for Defending Multicloud Architectures | Cybersecurity Leadership | Scoop.it
Complex security issues arise when different clouds and computing models interact.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

One third of security breaches go unnoticed by security professionals

One third of security breaches go unnoticed by security professionals | Cybersecurity Leadership | Scoop.it
While surface-level confidence around hybrid cloud security is high, the reality is nearly 1/3 of security breaches are going undetected.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Top Three Priorities for A Successful Cloud Security Strategy

Top Three Priorities for A Successful Cloud Security Strategy | Cybersecurity Leadership | Scoop.it
While the cost of cloud security measures may appear to be high, the cost of a data breach or security incident can be far greater and more damaging.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

9 Questions for IT Leaders to Ask About Cloud Cybersecurity

9 Questions for IT Leaders to Ask About Cloud Cybersecurity | Cybersecurity Leadership | Scoop.it
Rapid migration to the cloud continues, but the benefits of a cloud strategy must be balanced with cybersecurity. How can IT leaders assess their organizations’ cloud security posture?
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Strategies for Building Resilient Cloud Security in Small and Medium Enterprises

Strategies for Building Resilient Cloud Security in Small and Medium Enterprises | Cybersecurity Leadership | Scoop.it

Protecting sensitive data and ensuring compliance with regulations are paramount concerns for SMEs leveraging cloud services. To achieve resilient cloud security, SMEs must implement robust strategies tailored to their unique needs and resources.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cloud security is a shared responsibility

Cloud security is a shared responsibility | Cybersecurity Leadership | Scoop.it
The cloud service provider and the application provider create a secure foundation – but customers add one more piece to the puzzle.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Is your cloud security strategy ready for LLMs?

Is your cloud security strategy ready for LLMs? | Cybersecurity Leadership | Scoop.it
Your existing cloud security practices, platforms, and tools will only go so far in protecting the organization from threats inherent to the use of AI's large language models.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

IT Modernization Efforts Need to Prioritize Cybersecurity

IT Modernization Efforts Need to Prioritize Cybersecurity | Cybersecurity Leadership | Scoop.it

Investing in a robust, well-orchestrated and coordinated cyber security plan is a competitive advantage that can provide valuable returns to your business. Keeping your organization, its people and its data safe is top of mind for every CEO.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The lion’s share of CIOs cyber budgets must go to cloud security platforms

The lion’s share of CIOs cyber budgets must go to cloud security platforms | Cybersecurity Leadership | Scoop.it
CIOs must rethink how they approach and allocate budgets to protect the cloud. Blind spots must be eliminated in 2024.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

What We Can Learn From Major Cloud Cyberattacks

What We Can Learn From Major Cloud Cyberattacks | Cybersecurity Leadership | Scoop.it
Analysis of six major cloud incidents shows how some common mistakes can lead to serious consequences.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

How To Adopt Shift Left Security on the Cloud

How To Adopt Shift Left Security on the Cloud | Cybersecurity Leadership | Scoop.it

In an era where cloud computing reigns supreme, the concept of security has undergone a profound transformation. As businesses rapidly migrate their operations and data to the cloud, the need to secure this digital frontier becomes increasingly paramount.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Who's responsible for business risks in the cloud?

Who's responsible for business risks in the cloud? | Cybersecurity Leadership | Scoop.it
As businesses shift data and workflows away from their premises, the issue of who’s responsible for what in the cloud is becoming complex.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Five Questions to Ask About Your Employee Offboarding Process

Five Questions to Ask About Your Employee Offboarding Process | Cybersecurity Leadership | Scoop.it
Recent research shows that one third of enterprises lose more than 10% of their associated technology assets when offboarding workers, and 42% experience unauthorized access to SaaS applications and cloud resources.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Confidential computing is the essential data protection layer for evolving cloud threats

Confidential computing is the essential data protection layer for evolving cloud threats | Cybersecurity Leadership | Scoop.it

Confidential computing serves as a gateway between data in memory and code, ensuring that even if an attacker could perform a memory dump, the data would still be encrypted and inaccessible.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The unhappy reality of cloud security in 2023

The unhappy reality of cloud security in 2023 | Cybersecurity Leadership | Scoop.it
Let's talk about how you can stay off the growing list of companies that have been hacked. Spoiler alert: It takes money and commitment.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Observability will transform cloud security

Observability will transform cloud security | Cybersecurity Leadership | Scoop.it
Cloud security threats are increasing in both frequency and intensity. We need better visibility into potential threats and proactive approaches to addressing risk.
No comment yet.