article thumbnail

CISOs Tell All: Everything You’ve Ever Wanted To Know About CISOs in 2022

Tenable

A global survey provides a snapshot of what it’s like to sit in the CISO chair, as these cybersecurity leaders face increasingly sophisticated cyber threats and heightened expectations from their organizations. . The 2022 Global Chief Information Security (CISO) Survey polled 327 CISOs from the U.S., Europe and Asia-Pacific.

article thumbnail

Cybersecurity Snapshot: Cyber Engineers and Architects Saw Salaries Spike in 2022

Tenable

technology employees in 2022, and the pay growth was even higher for cybersecurity architects and engineers, whose compensation benefitted from their highly specialized skills and the criticality of their jobs. in 2022 to $111,348, and, despite tech industry layoffs, tech unemployment stood at only 1.5% in 2022 to $96,379.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Radar Trends to Watch: September 2022

O'Reilly Media - Ideas

Elon Musk has announced that Tesla will have a robot capable of performing household chores by the end of 2022. According to Okta , 97% of the respondents to their recent “state of zero trust” survey say they have zero trust initiatives in place, or will have them within the next year. Zero trust adoption has soared in the past year.

article thumbnail

3 Ways to Make Storage a Strategic Asset for Your Organization (Not Just an IT Cost)

CIO

Storage has emerged in 2022 as a strategic asset that the C-suite, not just the CIO, can no longer overlook. According to a Fortune 500 survey, 66% of Fortune 500 CEOs said their No. Similarly, in a KPMG CEO survey, CEOs also said cybersecurity is a top priority. Make storage part of the corporate cybersecurity strategy.

Storage 222
article thumbnail

Is a Deep Cover “Cyber Spy” Lurking in Your Data Infrastructure?

Infinidat

Thu, 02/24/2022 - 11:57. IT teams often don’t really understand how hard it is to detect ransomware and malware, as if a highly sophisticated, deep cover “spy” is present, either planting the seeds to inflict damage or stealing your organization blind. . Is a Deep Cover “Cyber Spy” Lurking in Your Data Infrastructure? Evan Doherty.

article thumbnail

Cybersecurity Snapshot: IoT Vendors Fail at Vulnerability Disclosures, While Cyber Threats Again Top Business Risks 

Tenable

Then scan the latest list of top malware. The report, now in its 12th year and based on a survey of 2,712 risk management experts from 94 countries and territories, found that cyber risk also ranks first among small business worries. Learn all about how most IoT product makers lack vulnerability disclosure policies. And much more!

IoT 52
article thumbnail

Daily Crunch: Elon Musk sets sights on Twitter with unsolicited $43B takeover bid

TechCrunch

Welcome to the Daily Crunch for Thursday, April 14, 2022! 8 cannabis investors share their outlook on the European market in H1 2022. For our latest survey, we talked with eight investors who are actively signing checks for cannabis tech companies. 8 cannabis investors share their outlook on the European market in H1 2022.

Malware 253