Cybersecurity Leadership
21.0K views | +1 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed?

DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed? | Cybersecurity Leadership | Scoop.it

In the age of DevOps, CISOs must ensure security is integrated from the start.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The importance of a good API security strategy

The importance of a good API security strategy | Cybersecurity Leadership | Scoop.it
A good API security strategy has become a crucial component of every organization that wants to keep its assets safe.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Shadow APIs are opening organizations to attacks

Shadow APIs are opening organizations to attacks | Cybersecurity Leadership | Scoop.it
Organizations are either failing to fully defend themselves or are relying on incomplete protection of APIs without real-time visibility
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Embracing DevSecOps: Agile, Resilient Software Development in Flux 

Embracing DevSecOps: Agile, Resilient Software Development in Flux  | Cybersecurity Leadership | Scoop.it

The rate of change in the security landscape is so fast-paced and there are always new threats and new threats to keep on top of. The idea of being able to build that process regularly into the framework means you can keep on top of it. If your system can’t scale, you can’t grow and if it is vulnerable the damage is immeasurable.

Scooped by JC Gaillard
Scoop.it!

How To Adopt Shift Left Security on the Cloud

How To Adopt Shift Left Security on the Cloud | Cybersecurity Leadership | Scoop.it

In an era where cloud computing reigns supreme, the concept of security has undergone a profound transformation. As businesses rapidly migrate their operations and data to the cloud, the need to secure this digital frontier becomes increasingly paramount.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why open-source software supply chain attacks have tripled in a year

Why open-source software supply chain attacks have tripled in a year | Cybersecurity Leadership | Scoop.it
Uneven maintenance practices and developers' willingness to download risky code have made open-source repositories a favored initial access tactic for attackers.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

From code to cloud: Achieving comprehensive application security in the cloud-native era

From code to cloud: Achieving comprehensive application security in the cloud-native era | Cybersecurity Leadership | Scoop.it

The growing use of pre-existing software in cloud application development increases the risk of vulnerabilities that could impact the entire application.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Shift left, save resources: DevSecOps and the CI/CD pipeline

Shift left, save resources: DevSecOps and the CI/CD pipeline | Cybersecurity Leadership | Scoop.it

Discovering a security flaw late in the development process is a waste of time, money, and effort. That’s why security checks during the continuous integration and continuous delivery/deployment (CI/CD) pipeline must be a CXO priority.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

How Development Teams Can Approach A Security Reset Amid Deglobalization

How Development Teams Can Approach A Security Reset Amid Deglobalization | Cybersecurity Leadership | Scoop.it
Deglobalization warrants a hard look by development organizations, particularly when it comes to questions like insider threats and supply chain risks. 
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Three steps to a solid DevSecOps strategy

Three steps to a solid DevSecOps strategy | Cybersecurity Leadership | Scoop.it
How buyers can manage third-party risk when procuring applications, how to secure the software development process, the use of open source components (such as Log4j), or even how to affect cultural change among developers not used to thinking cyber first.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Stop Fretting About Hiring Security Specialists

Stop Fretting About Hiring Security Specialists | Cybersecurity Leadership | Scoop.it

Fixing issues fast = more important than more specialists

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Developers, Security and Operations Walk into a Bar…

Developers, Security and Operations Walk into a Bar… | Cybersecurity Leadership | Scoop.it

DevSecOps should be a part of corporate culture by now instead of still providing comedic relief for geeks.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Putting cybersecurity first: Why secure‑by‑design must be the norm

Putting cybersecurity first: Why secure‑by‑design must be the norm | Cybersecurity Leadership | Scoop.it
Here's why cybersecurity must be built-in rather than bolted-on – but not at the expense of business growth and innovation.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why Adopting A DevSecOps Culture Is Non-Negotiable For Modern Application Security

Why Adopting A DevSecOps Culture Is Non-Negotiable For Modern Application Security | Cybersecurity Leadership | Scoop.it
DevSecOps is the non-negotiable key to building secure and resilient applications that can withstand modern and sophisticated cyber threats. 
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Building For a More Secure Future: How Developers Can Prioritize Cybersecurity

Building For a More Secure Future: How Developers Can Prioritize Cybersecurity | Cybersecurity Leadership | Scoop.it

Whether it be for business or consumer use cases, app developers and cybersecurity professionals need to operate on synergistic levels to uphold the safest options for clients.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

5 Tips for Strengthening the Developer-Security Team Relationship

5 Tips for Strengthening the Developer-Security Team Relationship | Cybersecurity Leadership | Scoop.it
Adopt these best practices to move past a reactive approach to software development and build a productive work environment. Collaboration can turn security into a shared goal, not a bottleneck.
Scooped by JC Gaillard
Scoop.it!

CISOs vs. developers: A battle over security priorities

CISOs vs. developers: A battle over security priorities | Cybersecurity Leadership | Scoop.it
Frameworks for software supply chain security have matured and given security teams methods for how they approach policies and oversight.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

How the EU Cyber Resilience Act could impact CIOs

How the EU Cyber Resilience Act could impact CIOs | Cybersecurity Leadership | Scoop.it

Europe’s Cyber Resilience Act is the first move in what is expected to be a wave of regulations coming to technology.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The 4 Keys to Building Cloud Security Programs That Can Actually Shift Left

The 4 Keys to Building Cloud Security Programs That Can Actually Shift Left | Cybersecurity Leadership | Scoop.it
The 4 best practices to implement true shift-left security. Developers and security teams must unite early in the software development lifecycle.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

5 Security Principles to Guide Your DevSecOps Journey

5 Security Principles to Guide Your DevSecOps Journey | Cybersecurity Leadership | Scoop.it

Building a DevSecOps initiative, no matter your budget, deployment environments or organization size, should be guided by a handful of principles. Here's what you need to know.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

9 API security tools on the frontlines of cybersecurity

9 API security tools on the frontlines of cybersecurity | Cybersecurity Leadership | Scoop.it
Top API security tools can help hold the line against modern threats to the important and ubiquitous software development interfaces.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Shine a Spotlight on Shadow APIs To Improve Security

Shine a Spotlight on Shadow APIs To Improve Security | Cybersecurity Leadership | Scoop.it
APIs are being deployed so fast and at such scale that companies risk both not knowing what they have (Shadow APIs), and losing control of API security, including exposing vital data and processes.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Software bill of materials: Managing software cybersecurity risks

Software bill of materials: Managing software cybersecurity risks | Cybersecurity Leadership | Scoop.it
As software-related vulnerabilities continue to grow, companies must manage their software cyber risks to innovate faster and create safer, more secure digital products.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

API Security Losses Total Billions, But It's Complicated

API Security Losses Total Billions, But It's Complicated | Cybersecurity Leadership | Scoop.it
A recent analysis of breaches involving application programming interfaces (APIs) arrives at some eye-popping damage figures, but which companies are most affected, and in what ways?
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Software Supply Chains Are Under Attack. Here’s What CEOs Need To Do

Software Supply Chains Are Under Attack. Here’s What CEOs Need To Do | Cybersecurity Leadership | Scoop.it

Software supply chain attacks will continue to be successful as long as the chasm between software development teams and info security teams persists.

Jay Holstine's curator insight, January 2, 2022 12:02 PM
Supply chain is a top CEO concern for 2020.