A report from Lenovo surveying 600 IT leaders across the world found two-thirds (65%) of leaders considered their defenses outdated and unable to keep modern attackers at bay.
Get Started for FREE
Sign up with Facebook Sign up with X
I don't have a Facebook or a X account
![]() ![]()
![]() A report from Lenovo surveying 600 IT leaders across the world found two-thirds (65%) of leaders considered their defenses outdated and unable to keep modern attackers at bay. No comment yet.
Sign up to comment
![]() CISOs must adopt living AI governance to balance innovation and security, preventing shadow AI risks.
![]() Rapid AI investments and the complexities of hybrid cloud architecture threaten to undermine enterprise trust in cloud platforms’ security.
![]() According to a survey of 461 organizations across North America, Europe, APAC, and the Middle East by Kiteworks, 46% of companies that don't know their third-party count also don't know their breach frequency.
![]() We have been doing cybersecurity awareness the wrong way for the last two decades; here is what to do to get it right
![]() It’s time to split the job before it breaks the business.
![]() Four interlocking ways to keep cybersecurity front of mind and deepen every employee’s involvement in this task.
![]() No matter why older IT systems are still around, companies need to protect stacks and devices before they become a vector for attacks.
![]() A wide variety of reporting structures can work if the CISO is understood to be semi-independent and governed by a group of trusted business, regional, and functional leaders.
![]() The problem isn’t just finding people with technical skills, it’s developing people internally who can also talk to executives and think like business leaders.
![]() While the furor from CISO prosecutions has died down, worries continue over a lack of liability protections and potential targeting by cybercriminals and hackers for their privileged roles.
![]() Directors can ensure compliance and enable strategic success in a complex landscape of cybersecurity regulations by taking these actions.
![]() The reliance on GenAI tools has inadvertently fostered a dangerous sense of complacency within organizations |
![]() If the security discussion hadn’t fully made its way into C-suite conversations before, it has now.
![]() AI expands the attack surface, raising new risks for organizations while also offering tools to detect and prevent attacks.
![]() From market and financial pressures to the rise of AI, CISOs are getting agile with their security outlooks and roadmaps to contend with and keep in front of accelerating risks and disruptions.
![]() Security tool sprawl bloats budgets, increases complexity and reduces efficiency.
![]() Insider threats are escalating and CISOs must act now to strengthen visibility, access controls and dedicated resources to defend against attacks from within
![]() This isn't just about adding AI tools to existing security workflows. It's about fundamentally new job categories that didn't exist even just a few months ago.
![]() As C-level executives, CISOs are accountable for anything that goes wrong but are not given the same C-level treatment and access that would help them execute their functions with authority.
![]()
From
www
Cyber attackers move at machine speed. Preemptive exposure management shortens the gap between detection and remediation with context and automation.
![]() The organisations best positioned to withstand future threats are those who adopt security practices designed with their OT context in mind.
![]() Increasing security spending after a cyber incident is falling out of fashion, as boards evolve their risk strategies, accept fate, and seek to embrace AI for relief, sending cyber leaders to look inward for process fixes.
![]() For security and business leaders alike, this evolution highlights the critical need to embed cybersecurity into the fabric of strategic planning and decision-making for the business.
![]()
From
hackernoon
Cybersecurity is no longer a cost center. Learn how to measure ROI, reduce risks, and turn security into a strategic business advantage. |