A blog from Aaron Tan, Computer Weekly’s Asia-Pacific editor, analyzing the latest trends, issues and technology innovations in the APAC region. The pace at which the cyber threat landscape is ...
The role of chief information security officers (CISOs) has evolved to become vital in organizations today. Beyond being mere gatekeepers, CISOs now provide diverse leadership solutions that influence ...
SANTA CLARA, Calif., June 25, 2024 /PRNewswire/ -- Netskope, a leader in Secure Access Service Edge (SASE), today published new global research that finds that shifts in the cyber threats landscape ...
21% of CISOs Have Been Pressured Not to Report a Compliance Issue, Research Finds Your email has been sent CISOs are being brought into the boardroom as cyber threats become a bigger risk, but face ...
A recent study shows that, given the increasing importance of cybersecurity, CISOs are gaining more and more influence on the board. In recent years, CISOs have often felt that their board of ...
Splunk, in collaboration with Oxford Economics, today released The CISO Report 2025, a global research report detailing the goals, priorities, and business strategies for Chief Information Security ...
CISOs today are under a perfect storm of pressures: rapidly expanding digital environments, demands to demonstrate ROI on past security investments and an ongoing shortage of skilled talent. At the ...
Cybersecurity has never been more critical for responsible corporate governance, as cyberattacks are among the gravest threats to companies' customers, operations, and reputations. Boards must invest ...
The SEC is finalizing rules that will require formally disclosing the backgrounds of board directors who companies want to position as cybersecurity experts. But as I’ve written previously, up to 90% ...
In a global study of the goals, priorities and strategies of chief information security officers (CISOs), security analytics and observability supplier Splunk and economic advisory firm Oxford ...
CISOs are trained to fix problems. Lawyers are trained to find them. The two must work together to address complex challenges like breaches, compliance, or the ethics of emerging technologies. There’s ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results