Remove Compliance Remove Internet Remove Metrics Remove Security
article thumbnail

Why IT leaders are putting more business spin on security spend

CIO

Gartner projects that spending on information security and risk management products and services will grow 11.3% To better focus security spend, some chief information security officers (CISOs) are shifting their risk assessments from IT systems to the data, applications, and processes that keep the business going.

Security 278
article thumbnail

Cybersecurity Snapshot: Cyber Pros Say How AI Is Changing Their Work, While the FBI Reports Ransomware Hit Critical Infrastructure Hard in 2023

Tenable

Plus, a survey shows how artificial intelligence is impacting cybersecurity jobs. That’s according to the “ 2023 Internet Crime Report ” which was released this week by the FBI’s Internet Crime Complaint Center (IC3) and also found that healthcare was the hardest hit among critical infrastructure sectors, with 249 reported attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: 6 Things That Matter Right Now

Tenable

Topics that are top of mind for the week ending July 29 | Boost your security awareness program. Why fire drills hurt security teams. Struggling to fill cybersecurity jobs? Cybersecurity hiring managers face intense competition for talent amid chronic staffing shortages. Source: The Center for Internet Security).

Malware 65
article thumbnail

Cybersecurity Q&A with Dave Elfering, VP information security at Werner Enterprises

Sailpoint

Dave Elfering, currently Vice President of information security has also witnessed a considerable amount of growth and change over his career when it comes to information security. In 1997, Elfering began working at Werner as a project manager to help the company build its online presence and secure its data.

article thumbnail

What’s next for network operations

CIO

They rely on centralized security performed by backhauling traffic through the corporate data center, which impairs application performance and makes them expensive and inefficient. But SD-WAN’s reliance on the Internet can introduce new challenges, and new requirements for network observability and monitoring.

Network 241
article thumbnail

Tenable Security Center Integration into Tenable One Delivers Full Exposure Management for On-Prem Customers

Tenable

With the integration of Tenable Security Center into Tenable One, Tenable becomes the only vendor to offer exposure management for both on-premises and hybrid deployment models. Now, users of the on-premises Tenable Security Center (formerly Tenable.sc) can realize the same platform benefits in their quest to reduce cyber risk.

Analysis 100
article thumbnail

From Solar Sunrise to Solar Winds: The Questionable Value of Two Decades of Cybersecurity Advice

Haft of the Spear

While the Ware Report of 1970 codified the foundations of the computer security discipline, it was the President’s Commission on Critical Infrastructure Protection report of 1997 that expanded those requirements into recommendations for both discrete entities as well as the nascent communities that were growing in and around the Internet.

Security 102