Want to appear here? Talk with us

Professional Risk
Ten career-ending mistakes CISOs make and how to avoid them

Being a top security boss is a hard job that often ends sooner than expected.

Many people in this role lose their jobs not because of a hack, but because they fail to talk to other leaders.

Learning how to stay safe in your career is just as vital as keeping the company data safe.

Talking to the Bosses

One big mistake is using too much tech talk when speaking to the board of directors.

High level leaders care about money and risk, not the specific names of computer viruses.

If they do not understand what you are saying, they will not give you the help or money you need.

Being Honest About Bad News

Trying to hide a small problem often leads to a much bigger mess later on.

When a mistake happens, it is better to tell the truth right away and show a plan to fix it.

Trust is very hard to build back once it is broken by a lie or a secret.

Staying Close to the Business

Security should not be a department that just says no to every new idea.

A smart leader finds ways to let the company grow while keeping the doors locked tight.

If you stop the company from making money, you will be seen as a problem instead of a partner.

Success in this role depends on building strong bonds with every other part of the company.

Vendor Risk
Supply Chain Attacks Emerge as Top Global Cyber Threat

Hackers have changed their plans and are now attacking the companies that help your business run instead of attacking you directly.

A new report shows that these "supply chain" attacks have become the top danger for companies all over the world.

By breaking into one big supplier, bad actors can quietly slip into hundreds of other businesses at the same time.

A Self-Feeding Cycle of Crime

Criminals are now using a smart, step-by-step process to grow their power across the web.

They start by stealing digital keys from small groups that share code or tools that many people use.

Once they have those keys, they use them to break into larger business tools and stay hidden for a long time.

Faster Attacks with New Tech

Bad actors are starting to use smart computer programs to find weak spots much faster than any person could.

These tools can scan thousands of systems in seconds to find a way in through an app or a web tool.

They also use these tools to write emails that look so real that even smart people get tricked into giving away their secrets.

No More Safe Walls

Experts warn that you can no longer stay safe just by building a strong wall around your own office.

You must now watch every single partner, tool, and piece of code that connects to your business.

If one of your partners gets hacked, your data is at risk even if your own systems are working perfectly.

Security is now about checking and watching every single link in the chain to stop a single mistake from spreading everywhere.

📺️ Podcast
Freedom, Responsibility, and the Federated Guardrails: A New Model for Modern Security

Guest Alex Shulman-Peleg discusses the move toward Distributed Security Ownership, where central security teams act as enablers rather than gatekeepers.

The "911 Service" Model

Central security teams are shifting away from manual approvals to become professional advisors; they provide the guardrails (tools and metrics), while engineering teams own the daily security of their products.

Security as a Quality Metric

In modern development, a "security-unaware" developer is viewed as a "bad developer," as security is treated as a fundamental requirement of software quality rather than a separate compliance checkbox.

Unified Risk Ranking

Efficient scaling requires a single methodology to rank both software vulnerabilities and cloud misconfigurations together, allowing teams to prioritize the most critical threats to the business first.

Federated Governance via Cloud Hierarchy

By leveraging cloud-native folder and project structures, leaders can enforce "invisible" security policies that allow developers to work at high speed without sacrificing organizational safety.

Account Exposure
Data breach at fintech firm Betterment exposes 1.4 million accounts

A well known finance company recently faced a major safety scare that affected over one million people.

Bad actors found a way to look at private details like names and phone numbers by tricking their way into the system.

This event shows that even strong companies can be at risk when someone makes a simple mistake.

Tricking the System

The group behind the attack did not use a complex virus to get inside.

Instead, they used social tricks to get access to a tool the company uses to talk to its customers.

Once they were in, they were able to see information for 1.4 million accounts and send out fake messages.

Fake Money Offers

After getting into the system, the attackers sent out emails that looked like they were from the real company.

These messages told users they could get free digital money if they clicked a link.

It was a trap to get people to give away their own money or secrets to the hackers.

Keeping Your Data Safe

The company said its main bank systems and real money were never touched during this time.

They have now fixed the hole and are watching for any other people trying to do the same thing.

They also told all their users to be very careful with any odd emails they receive.

Safety depends on checking every message twice even when it looks like it comes from a trusted source.

Risk-Led Security
How CISOs can go beyond compliance standards to better protect their organizations

Meeting the basic rules for computer safety is a good start, but it is not enough to keep a company safe today.

Many leaders focus only on passing a yearly test, yet this can leave doors open for hackers who do not follow the rules.

True safety comes from doing more than what is written on a simple list.

Moving Past the Checklist

A common mistake is thinking that being "compliant" means the company is fully protected.

Rules are often old and do not cover the newest tricks that bad actors use to steal data.

Smart leaders look at their own unique risks and build plans that go far beyond what the law requires.

Testing for Real Problems

Instead of just checking a box, teams should act out what would happen during a real attack.

This helps find weak spots that a standard audit would never see.

It is better to find a flaw yourself during a test than to have a hacker find it for you later.

Building a Strong Culture

Safety is not just a job for the people in the tech room; it is something everyone in the company must care about.

When people understand why the rules exist, they are more likely to follow them and spot odd things.

This creates a team that can react fast when a new problem pops up.

Real safety is a daily habit that requires constant work and a focus on real world risks.

Third-Party Leak
Flickr emails users about data breach, pins it on 3rd party

A popular photo site recently told its users that some of their private information was stolen.

The problem did not happen on the main site itself but at a different company that helps them with their work.

This shows how one small mistake at a partner company can cause big problems for everyone else.

A Shared Problem

The information was taken from a tool that the site uses to send out emails and ads.

Hackers were able to see names and email addresses because the outside company had a weak spot.

When you give your data to one site, it often goes to many other smaller companies that help run things.

Fixing the Hole

The photo site acted fast to stop the leak as soon as they found out about it.

They sent out emails to warn people so they could watch out for fake messages or scams.

They also made sure that the partner company fixed the problem so it would not happen again.

Why It Matters

This event is a good reminder that staying safe online means checking every link in the chain.

Even if a big company is very careful, their smaller partners might not be as strong.

Users should always be careful with the information they share and use strong passwords everywhere.

Companies must watch their partners closely to make sure your private data stays private.

Stay safe!

Eyal Estrin, Author @ CSec Weekly