Cybersecurity Leadership
21.0K views | +1 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed?

DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed? | Cybersecurity Leadership | Scoop.it

In the age of DevOps, CISOs must ensure security is integrated from the start.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cloud security is a shared responsibility

Cloud security is a shared responsibility | Cybersecurity Leadership | Scoop.it
The cloud service provider and the application provider create a secure foundation – but customers add one more piece to the puzzle.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Building For a More Secure Future: How Developers Can Prioritize Cybersecurity

Building For a More Secure Future: How Developers Can Prioritize Cybersecurity | Cybersecurity Leadership | Scoop.it

Whether it be for business or consumer use cases, app developers and cybersecurity professionals need to operate on synergistic levels to uphold the safest options for clients.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Shadow APIs are opening organizations to attacks

Shadow APIs are opening organizations to attacks | Cybersecurity Leadership | Scoop.it
Organizations are either failing to fully defend themselves or are relying on incomplete protection of APIs without real-time visibility
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Embracing DevSecOps: Agile, Resilient Software Development in Flux 

Embracing DevSecOps: Agile, Resilient Software Development in Flux  | Cybersecurity Leadership | Scoop.it

The rate of change in the security landscape is so fast-paced and there are always new threats and new threats to keep on top of. The idea of being able to build that process regularly into the framework means you can keep on top of it. If your system can’t scale, you can’t grow and if it is vulnerable the damage is immeasurable.

Scooped by JC Gaillard
Scoop.it!

How To Adopt Shift Left Security on the Cloud

How To Adopt Shift Left Security on the Cloud | Cybersecurity Leadership | Scoop.it

In an era where cloud computing reigns supreme, the concept of security has undergone a profound transformation. As businesses rapidly migrate their operations and data to the cloud, the need to secure this digital frontier becomes increasingly paramount.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why open-source software supply chain attacks have tripled in a year

Why open-source software supply chain attacks have tripled in a year | Cybersecurity Leadership | Scoop.it
Uneven maintenance practices and developers' willingness to download risky code have made open-source repositories a favored initial access tactic for attackers.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

A CISO's Guide to Paying Down Software Supply Chain Security Debt

A CISO's Guide to Paying Down Software Supply Chain Security Debt | Cybersecurity Leadership | Scoop.it
When you just keep filing it away to handle "someday," security debt typically rears its head when you are most vulnerable and can least afford to pay it.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

5 Security Principles to Guide Your DevSecOps Journey

5 Security Principles to Guide Your DevSecOps Journey | Cybersecurity Leadership | Scoop.it

Building a DevSecOps initiative, no matter your budget, deployment environments or organization size, should be guided by a handful of principles. Here's what you need to know.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

9 API security tools on the frontlines of cybersecurity

9 API security tools on the frontlines of cybersecurity | Cybersecurity Leadership | Scoop.it
Top API security tools can help hold the line against modern threats to the important and ubiquitous software development interfaces.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Shine a Spotlight on Shadow APIs To Improve Security

Shine a Spotlight on Shadow APIs To Improve Security | Cybersecurity Leadership | Scoop.it
APIs are being deployed so fast and at such scale that companies risk both not knowing what they have (Shadow APIs), and losing control of API security, including exposing vital data and processes.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Software bill of materials: Managing software cybersecurity risks

Software bill of materials: Managing software cybersecurity risks | Cybersecurity Leadership | Scoop.it
As software-related vulnerabilities continue to grow, companies must manage their software cyber risks to innovate faster and create safer, more secure digital products.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

API Security Losses Total Billions, But It's Complicated

API Security Losses Total Billions, But It's Complicated | Cybersecurity Leadership | Scoop.it
A recent analysis of breaches involving application programming interfaces (APIs) arrives at some eye-popping damage figures, but which companies are most affected, and in what ways?
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why Adopting A DevSecOps Culture Is Non-Negotiable For Modern Application Security

Why Adopting A DevSecOps Culture Is Non-Negotiable For Modern Application Security | Cybersecurity Leadership | Scoop.it
DevSecOps is the non-negotiable key to building secure and resilient applications that can withstand modern and sophisticated cyber threats. 
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The importance of a good API security strategy

The importance of a good API security strategy | Cybersecurity Leadership | Scoop.it
A good API security strategy has become a crucial component of every organization that wants to keep its assets safe.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Three Questions To Ask Third-Party Vendors About Cybersecurity Risk

Three Questions To Ask Third-Party Vendors About Cybersecurity Risk | Cybersecurity Leadership | Scoop.it
How can companies apply rigor when evaluating the security of their software vendors and managed service providers? 
No comment yet.
Scooped by JC Gaillard
Scoop.it!

5 Tips for Strengthening the Developer-Security Team Relationship

5 Tips for Strengthening the Developer-Security Team Relationship | Cybersecurity Leadership | Scoop.it
Adopt these best practices to move past a reactive approach to software development and build a productive work environment. Collaboration can turn security into a shared goal, not a bottleneck.
Scooped by JC Gaillard
Scoop.it!

CISOs vs. developers: A battle over security priorities

CISOs vs. developers: A battle over security priorities | Cybersecurity Leadership | Scoop.it
Frameworks for software supply chain security have matured and given security teams methods for how they approach policies and oversight.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

How the EU Cyber Resilience Act could impact CIOs

How the EU Cyber Resilience Act could impact CIOs | Cybersecurity Leadership | Scoop.it

Europe’s Cyber Resilience Act is the first move in what is expected to be a wave of regulations coming to technology.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The 4 Keys to Building Cloud Security Programs That Can Actually Shift Left

The 4 Keys to Building Cloud Security Programs That Can Actually Shift Left | Cybersecurity Leadership | Scoop.it
The 4 best practices to implement true shift-left security. Developers and security teams must unite early in the software development lifecycle.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

From code to cloud: Achieving comprehensive application security in the cloud-native era

From code to cloud: Achieving comprehensive application security in the cloud-native era | Cybersecurity Leadership | Scoop.it

The growing use of pre-existing software in cloud application development increases the risk of vulnerabilities that could impact the entire application.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Shift left, save resources: DevSecOps and the CI/CD pipeline

Shift left, save resources: DevSecOps and the CI/CD pipeline | Cybersecurity Leadership | Scoop.it

Discovering a security flaw late in the development process is a waste of time, money, and effort. That’s why security checks during the continuous integration and continuous delivery/deployment (CI/CD) pipeline must be a CXO priority.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

How Development Teams Can Approach A Security Reset Amid Deglobalization

How Development Teams Can Approach A Security Reset Amid Deglobalization | Cybersecurity Leadership | Scoop.it
Deglobalization warrants a hard look by development organizations, particularly when it comes to questions like insider threats and supply chain risks. 
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Three steps to a solid DevSecOps strategy

Three steps to a solid DevSecOps strategy | Cybersecurity Leadership | Scoop.it
How buyers can manage third-party risk when procuring applications, how to secure the software development process, the use of open source components (such as Log4j), or even how to affect cultural change among developers not used to thinking cyber first.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Stop Fretting About Hiring Security Specialists

Stop Fretting About Hiring Security Specialists | Cybersecurity Leadership | Scoop.it

Fixing issues fast = more important than more specialists

No comment yet.