Early Morning Byte: Monday, January 29, 2024

Security Flaws and a Dynamic Partnership 💥

☀️ Good Morning Thought Leaders. In today's issue of the Early Morning Byte, we spotlight the dynamic role of CEOs and CISOs, a partnership critical in steering companies through today’s tech challenges.

Join us as we explore CISA's decisive response to the Ivanti VPN vulnerabilities, the complexities of the LockBit ransomware attack on EquiLend, the SEC's recent encounter with SIM swapping cybercriminals, and more with The National CIO Review.

- Emily, Kelsey, and Your TNCR Crew

FEATUREDFrom the CISO to the CEO

The modern CEO’s role is typically twofold, depending on the type and size of the company. Your first role is internal – you’re setting the strategy of the company and the overall priorities needed to implement the strategy. Externally, you’re basically “head cheerleader” with a responsibility to take the company’s story far and wide, not the products or services of the company, but the company itself.  You’re telling it to investors, shareholders, strategic partners, and customers.

By Erik Boemanns, Contributing CISO ● Read More…

EXTRA BYTES

CISA has issued a critical emergency directive in response to severe vulnerabilities discovered in Ivanti Connect Secure and Ivanti Policy Secure products.

RailPros, a company exclusively focused on providing services to freight, passenger, and transit rail carriers across North America, is on the lookout for its next Chief Information Officer (CIO).

EquiLend, a prominent financial-technology firm integral to Wall Street’s securities-lending industry, has suffered a ransomware attack orchestrated by the notorious hacking gang LockBit.

In a series of cyberattacks, hackers infiltrated the U.S. Department of Health and Human Services (HHS), diverting approximately $7.5 million of grant money intended for civilian projects

TRENDINGHackers Play SIM Card Shuffle with the SEC

The Securities and Exchange Commission (SEC) recently fell victim to a cybercrime incident involving the takeover of their social media account on X. The technique used in this attack was SIM swapping, a persistent and sophisticated cybercrime tactic. This method involves the transfer of a victim’s phone number to another device that the attacker controls.

By Emory Odom, Contributing Writer ● Read More…

RESOURCE HUB

CIO Professional Network®The Fastest Growing Online Community for Technology Leaders

The CIO Professional Network is member-driven, member-led, and member-supported community of technology executives seeking to Connect, Collaborate, and Contribute. 

CISA BULLETIN

The Cybersecurity & Infrastructure Security Agency provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology. Read the Latest Vulnerability Bulletin

FEATURED OPPORTUNITY

CIO Partners has been selected by our client to lead their confidential search for the role of Head of Enterprise Applications, located in Greater New York City. Read More...

FROM OUR LIBRARY

A MESSAGE FROM YOUR TNCR CREW

Amplifying the Voice of the CIO

Subscribers make it possible for your TNCR Crew to curate the latest in technology thought-leadership. To support our work and get unlimited access to our award-winning coverage, subscribe today.

Logo

Copyright ©

Notifications are important to maintain a community that Connects, Collaborates, and Contributes. If you need assistance changing your unsubscribe, please let us know, and we will be happy to assist.