CISO culture SASE, single-vendor, Palo Alto Networks SASE network engineer endpoint Qualys security culture Palo Alto Networks SASE network VPN cybersecurity culture

Beyond Technology: The Crucial Role of Culture in a CISO’s Realm

While technology still plays a vital role in job success, it's just as essential for a CISO to foster a strong security culture ...
Security Boulevard
cybersecurity Vendor Risk Management: The Secret Ingredient

Four Steps to Cutting Cybersecurity Budgets Without Increasing Risk

Here's how CISOs can look at cybersecurity through a capital efficiency lens without unacceptably growing risk—to the organization and their own jobs ...
Security Boulevard
zero-day zero-trust app hardware zero-trust prepare

Applying Zero-Trust Principles: Case Studies and Lessons From the Field

The Advanced Cyber Security Center interviewed members to understand how they implemented zero-trust and what lessons they could share with others seeking to do the same.  ...
Security Boulevard
Safe Security risk What’s Causing CISOs Stress

A Guide to Articulating Risk: Speaking the Language of the Stakeholder

The role of the modern CISO today is just as much about managing technical solutions as it is about communicating risk to key decision-making stakeholders. In their daily roles, most C-suite executives ...
Security Boulevard

Red Team Exercises on a Budget

How can busy and financially stretched security teams conduct red team exercises on a budget?  In our business world of escalating cybersecurity threats, the role of red team exercises is becoming increasingly ...
Red Menshen budgets semiconductor data, secure, conflict, oil security tools budget dark, web, threat

CISOs Expect Stable IT Security Budgets in 2023

Cybersecurity budgets are on the rise despite continued economic uncertainty as CISOs and IT decision-makers (ITDMs) report increased confidence in their cybersecurity systems, especially as it relates to end-user compliance. These were ...
Security Boulevard
Understanding Cloud Data Risk – Uncovering Data and Identities

Understanding Cloud Data Risk – Uncovering Data and Identities

Reading Time: 4 minutes Data. The most fundamental construct of the enterprise today. We collect it from our customers. We buy it from third parties. We aggregate it in our data stores ...
generative AI network, attack, organizations HEAT attack ransomware threats cyberattacks virtual appliances

External Attack Surface Management: How Focusing on Basics Improves Security

External attack surface management (EASM) has become a vital strategy for improving cybersecurity, particularly amid recession fears that have stressed the business landscape across several sectors for many months. The task is ...
Security Boulevard
Evolving Role of the CISO: From IT Security to Business Resilience

Evolving Role of the CISO: From IT Security to Business Resilience

With more and more large organizations relying on technology to conduct business, the need for a skilled CISO has become increasingly important. No longer just overseeing IT security efforts, the CISO is ...
cloud compliance

Sonrai’s Cloud Access Intelligence Helps You Pass an Audit

Reading Time: 7 minutes Cloud Compliance & Passing Audits Knowing (1) what and who’s in your cloud, (2) what they can access and (3) what they can do, is the underpinnings of ...