CISOs Navigate Legal Risks After Former Uber Executive’s Conviction
High-profile legal cases have set CISOs on edge about the liabilities they face while working through major security incidents...
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
High-profile legal cases have set CISOs on edge about the liabilities they face while working through major security incidents...
Ransomware actors are getting better at laundering their proceeds from attacks - but law enforcement authorities are also...
Despite the U.S. government adopting many recommendations by the Ransomware Task Force in combating ransomware, authorities...
Sounil Yu, CISO at JupiterOne, talks about imposter syndrome and pinpointing gaps in organizations’ security programs.
Helen Patton, CISO for the Security Business Group at Cisco, discusses why it’s vital for CISOs to be able to “talk about security things in non-security ways with non-security people.”
Lucia Milica, global resident CISO at Proofpoint, talks about challenges that CISOs face when interacting with the leadership team.
Researchers warn that the usage of the discontinued Boa web server is opening up SDKs and Internet of Things devices to attack.
The inherent complexity, speed and secrecy across the acquisitions process makes this landscape particularly lucrative for threat actors.