Remove Leadership Remove Organization Remove Security Remove Webinar
article thumbnail

Phishing 2.0: How to How Stop Cyberattacks Even Pros Can’t Catch

Ivanti

According to Ivanti’s 2023 Press Reset cybersecurity report , over 50% of surveyed security professionals said their organizations hadn’t experienced a phishing incident in the last 24-months – despite virtually every organization getting phished in 2022! Additional webinar resources : Full Phishing 2.0

article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response

Tenable

government to critical infrastructure organizations: If the drones you’re using were made in China, be careful. Cybersecurity and Infrastructure Security (CISA) agency and the Federal Bureau of Investigation (FBI) said this week. Dive into six things that are top of mind for the week ending January 19. The upside?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: CISOs Say Breaches Are Down, but Staffing Remains Difficult

Tenable

Plus, the free cloud security tools CISA recommends you use. That’s according to the annual “Information Security Maturity Report” report from ClubCISO, a private forum of over 800 cybersecurity leaders. Plus, why you should pay attention to the FTC’s investigation into ChatGPT-maker OpenAI. And much more!

article thumbnail

Cybersecurity Snapshot: As ChatGPT Fire Rages, NIST Issues AI Security Guidance

Tenable

Plus, how organizations are balancing AI and data privacy. Also, check out our ad-hoc poll on cloud security. issues framework for secure AI Concerned that makers and users of artificial intelligence (AI) systems – as well as society at large – lack guidance about the risks and dangers associated with these products, the U.S.

ChatGPT 52
article thumbnail

5 Steps for Becoming a Business-Aligned Cybersecurity Leader

Tenable

Independent business risk study shows when security and the business are aligned around agreed-upon contextual data, they deliver demonstrable results. Folks, cybersecurity is broken. Security leaders are drowning in data. Because we're missing one key piece of information: business context. Here's how to get there.

Security 101
article thumbnail

New Data Reveals Company Size May Be Tied To Remote-Worker Cybersecurity Practices

Tenable

Employees at the largest firms are least likely to adhere to wifi and password security guidelines. The security of a company is often in the hands of the employees who access its data day-to-day. Corporate security guideline adherence . Personal device use for work.

Company 100
article thumbnail

Stepping up to the challenge of a global conglomerate CIO role

CIO

I was regularly interacting not only with the IT leadership but also with the other business teams such as SCM, HR, accounts and finance, strategy, and M&A of the Reliance Group. The IT in Reliance is not only cutting-edge, but it is also more organized. I knew how to engage with the leadership team.