The economic damage from cybercrime doesn’t always come in the form of bits and bytes.
|
Scooped by
JC Gaillard
onto Cybersecurity Leadership September 4, 2019 2:12 AM
|
Get Started for FREE
Sign up with Facebook Sign up with X
I don't have a Facebook or a X account
|
Scooped by
JC Gaillard
onto Cybersecurity Leadership September 4, 2019 2:12 AM
|
The economic damage from cybercrime doesn’t always come in the form of bits and bytes.
![]() ![]()
![]()
From
www
To rise above the cyber threat landscape, organisations must invest in modernising legacy systems and invest in AI.
![]() Wipro’s latest “State of Cybersecurity Report 2025” just dropped, and while the headlines will focus on the tech giant’s parade of AI, zero trust, and attack surface stats, let’s cut to the actual read-between-the-lines: Enterprises are drowning in digital ambiguity, even as they brag about investment, and the basic math still doesn’t add up.
![]()
From
www
CISOs increasingly need dedicated time with the board, but lack of board knowledge of cybersecurity and inability to translate security into business risk can hamper effective discussions.
![]() The cybersecurity landscape has reached a pivotal moment where Chief Information Security Officers (CISOs) are fundamentally reshaping their approach to organizational protection.
![]() As cyber attacks continue to rise, alarming disconnects between chief information security officers (CISO) and the rest of the C-suite are putting organizations at risk.
![]() This year marks ten years since we established Corix Partners in its current form, and I would like to reflect on the work we’ve done, the challenges we’ve seen, and the recurring themes that continue to shape cybersecurity as a discipline.
![]() In the end, cybersecurity isn’t just about collecting data. It’s about proving that your defenses actually work.
![]() In an era of escalating digital threats, the corporate board finds itself under increasing pressure to provide meaningful cybersecurity oversight.
![]()
From
hbr
Many boards overestimate their company’s cybersecurity readiness while underestimating the strategic importance of their own role in shaping it.
![]()
From
cyberscoop
Here’s why CIOs must lead post-quantum cryptography adoption in 2025 to secure digital assets and future-proof organizations.
![]() Cybercriminals are using AI to create convincing impersonations, making employee cybersecurity awareness and robust security measures more critical than ever.
![]() Let’s be real: 2024 is the year AI went from pilot to policy. And in 2025, it’s not slowing down.
![]() Silos in cybersecurity stem from differing team priorities; bridging them takes communication, collaboration, and shared risk goals. |
![]()
From
www
As business risk takes center stage, CISOs are embracing elevated roles, transforming themselves into more integral business leaders for their organizations.
![]() Women bring a unique set of skills and perspectives to the table that can help bridge the gap in cybersecurity talent. Let’s take a look at some of the reasons why women are essential in this field
![]()
From
www
Most organizations aren't truly cyber resilient, but those that are share certain important characteristics. Here's what they are and how you can achieve them.
![]()
From
www
CEOs, CFOs and boards should take steps to more meaningfully integrate cybersecurity into transformations and other strategic initiatives.
![]() Short-term business thinking, broken project culture, and the missing link between CISOs and the C-suite are key factors
![]() As cyberthreats increase in both scale and sophistication, breach rates have surged to 55% during the past year, representing a 17% year-on-year rise, with AI-generated attacks emerging as a key driver of this growth.
![]() Organizations that stay ahead of attacks won't be the most compliant ones — they'll be the ones most honest about what actually works.
![]() The key to navigating this new GenAI landscape is a balanced approach — one that fosters transparency, strengthens regulatory frameworks, and embraces privacy-enhancing technologies.
![]() By prioritizing cyber hygiene—patching systems, training staff, and consolidating tools—organizations can build stronger defenses and free up resources to tackle more sophisticated threats when they do arise.
![]() The cybersecurity landscape has never moved faster — and the people tasked with defending it have never felt more exposed.
![]()
From
www
To get the most from artificial intelligence without falling prey to the risks, your company must implement a governance, risk, and compliance (GRC) framework specific to AI. Here’s how to develop a corporate policy that works.
![]() Capital One executives share insights on how organizations should design their security programs, implement passwordless technologies, and reduce their attack surface. |