This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
For nearly a decade, we’ve heard the same discussion in cybersecurity circles about the gender diversity problem. Yet here we are, in 2025, and the percentage of women in cybersecurity remains stagnantor worse, is backtracking. Meanwhile, cybersecurity job vacancies are skyrocketing. It’s utter madness.
Veteran cybersecurity expert witness executive will help strengthen law enforcement capabilities to prevent, investigate, and prosecute information-age crimes. Analysts have calculated that he is among the top three cybersecurity influencers worldwide. patent filings.
Steinberg was selected for the forum based on his proven expertise in the fields of cybersecurity, privacy, and artificial intelligence. Steinberg brings important insights about cybersecurity, privacy, and artificial intelligence to this community.”. He amassed millions of readers as a regular columnist for Forbes and Inc.
Cybersecurity governance has undergone a dramatic transformation over the past few decades. We have moved beyond traditional compliance-driven security models to risk-based approaches, integrating cybersecurity into enterprise risk management (ERM) frameworks. But the question remains: where are we headed?
Today, however, after, having had literally hundreds of conversations with, and about, Israeli cybersecurity companies, I thought that I would mention to my readers a few of the firms that I find interesting. The firm has also expanded into cybersecurity systems for aircraft. Axis Security.
In 2021, Newsweek invited Steinberg to join its community of pioneering thinkers and industry leaders, and to provide the news outlet with input related to his various areas of expertise, including cybersecurity, privacy, and artificial intelligence. He amassed millions of readers as a regular columnist for Forbes and Inc.
In 2021, based on Steinberg’s proven expertise in the fields of cybersecurity, privacy, and artificial intelligence, the premier news outlet invited him to join its community of pioneering thinkers and industry leaders, and to provide input related to his areas of expertise.
The world of cybersecurity is booming, with digital threats increasing and businesses needing to protect their data. But can cybersecurity make you a millionaire ? As the demand for cybersecurity professionals continues to rise, so do the financial opportunities for those who excel in this domain.
Cybersecurity training has steadily gained traction in corporate settings over the past decade, and rightfully so. Cybersecurity education for kids is therefore a smart investment. We know that we will need many more experts in cybersecurity than we are currently grooming. Do you have a corporate book club?
I’m delighted to announce the latest member of our growing CISO Advisor team, Pam Lindemeon. Pam is an exceptional leader; dedicated to advancing women in the IT industry, and I’m so glad she’s now joined Cisco to work closely with our community of CISOs and offer advice and guidance based on her incredible experience. Pam Lindemeon.
“The Hitchhiker’s Guide to the Galaxy,” by Douglas Adams, could actually be a guide to cybersecurity if read in a different context. The crux of the problem in present-day cybersecurity practice is summed up in this exchange from the book: After seven and a half million years of computing, “The answer to the Great Question of.
Here are some tips to excite kids about cybersecurity. In my latest book, The Super Smart Cyber Guide for Kids , I combine educational narrative, conversation starters and fun activities to inspire children, while offering a guided teaching tool to adults. Discuss digital personas. About the essayist.
The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry.
In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. Michael Gregg is the CISO for the State of North Dakota. He was voted one of the top 100 CISOs for 2023, has been invited to the White House, has testified before the U.S.
Touhill brings a rich and diverse background to the role, having spent years protecting military computer networks as an Air Force brigadier general and later serving as director of the National Cybersecurity and Communications Integrations Center at the Department of Homeland Security. I lived it. I’m absolutely thrilled.
This is how to redefine CISO events! I had a spectacular time at the “Locked In — The Cybersecurity Event of the Year!” Forget long boring sessions and tracks, this was about CISOs connecting at a social level, building relationships, and sharing insights. Organized by Rinki Sethi and Lucas Moody, it was nothing short of epic!
Related: Preparing for ‘quantum’ hacks That being so, a new book, Fixing American Cybersecurity , could be a long overdue stake in the ground. Laid out in two parts, Fixing American Cybersecurity dissects the drivers that got us here and spells out explicitly what’s at stake.
Too many people are unsure how to enter or grow in the cybersecurity industry. Hiring managers who are worried about finding candidates because of the much-discussed cybersecurity skills gap should consider the underlying issue, which I'd like to call the cybersecurity careers gap. Explain what a cybersecurity career entails.
This is bad news for everyone, but it may turn out to be especially hard on women in cybersecurity. I wrote about this in Chapter 2 of my book IN Security (shameless plug – it’s available on Amazon ). The skills gap in cybersecurity is already widening and layoffs will make it worse. Here’s why: #1.
In an article by mathematician Hannah Fry in the March 29, 2021 edition of The New Yorker, she reviews two new books on data and statistics. The post Don’t Count on Cybersecurity Data appeared first on Security Boulevard. We collect and disseminate all manner of data, but not so much of data which count.
Before you do either of those things—again—consider this: a new computer chip remains unhacked after DARPA and more than 500 cybersecurity researchers tried to break through its security. Pete Chronis, former CISO at Warner Media (HBO, Turner Broadcasting, etc.), was discussing his recent book about fixing cybersecurity.
Is it really something worth celebrating in cybersecurity? In other reports, for example Cybersecurity Ventures , women consistuted 20% in 2019 and 25% in 2021, and the UK’s Department of Culture and Media Studies (DCMS), found that the proportion of women in the workforce has increased from 16% in 2021 to 22% in 2022.
While serving with the think tank, Steinberg will continue in his full-time role as an independent cybersecurity expert witness and advisor, and as the author of one of the most-read columns in the cybersecurity field. About GFCyber. He amassed millions of readers as a regular columnist for Forbes and Inc.
A new book exposes yet another Facebook failure for the social media firm to say sorry about. But nothing’s going to change. The post Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data appeared first on Security Boulevard.
Since 2011, I’ve consistently spoken, and written about the dangers of burnout in cybersecurity, and proposed leadership strategies for employee wellbeing. According to IBM , mistakes in cybersecurity are still so overwhelming that 95% (19 in 20) result from human error, and the global average total cost of a data breach is $4.35M.
By Sebastian Goodwin, CISO, Nutanix IT budgets and revenue growth areas are top of mind at the beginning of every calendar year, even more so with the current state of the world economy. IT departments and data teams are looking at the best ways to prioritize, maintain and build security measures – while being cost effective.
A conversation with Jason Witty, head of cybersecurity and technology controls, and global chief information security officer for JPMorgan Chase. One of a series of security leadership profiles prepared by Cybersecurity Collaborative in conjunction with SC Media. On adaptability, we all know that we are never “done” in cybersecurity.
Simply taking a pause from email and social media in favor of a good book or conversation is known to increase your mood and life satisfaction. While unplugging isn’t an option for business, the notion of stepping back to give your business the time to evaluate cybersecurity preparedness can be highly beneficial.
Mauro Israel is an avid poker player, having studied the game since he was a teenager and written several books on the topic. The same is true in cybersecurity, a field that is constantly evolving, especially in the wake of COVID-19. Listen to episode 8 of CISO Stories, Going All-in on a Career in Security. ”).
ISC)2’s research in 2021, ’In Their Own Words: Women and People of Color Detail Experiences Working in Cybersecurity, ’ highlights the division women and people of colour in cyber face, and I encourage you to read it if you’ve not done so already. It’s helping me massively. Or, you can speed the process up and work with me.
Category Cybersecurity Fundamentals Risk Level. Recently, however, this has evolved to add a new responsibility: collaboration with the Chief Information Officer (CIO) and the Chief Information Security Officer (CISO). Says every CFO to their team as they work to apply their expertise to measure its cybersecurity risk.
Nowadays, organisations need digital leaders such as CIOs, CISOs, and CTOs who are strategists, visionaries, and know how to manage, effectively. trillion cumulative GDP growth.The skills gap is slowing digital transformation and in cybersecurity it’s increasing risks. When they anticipate the next steps, and act upon them.
In an article for CISO Compass, CEO and CISO, Lee Parrish, deftly uses a colonoscopy metaphor to illustrate the difference between security and compliance. This isn’t his first foray into thinking outside the box to explain cybersecurity. Listen to episode 9 of CISO Stories, The Colonoscopy of CyberSecurity.
With Black Hat USA 2021 just around the corner, I had a deep discussion about this with Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security. We discussed why graph databases and graph analytics are so well-suited to advancing cybersecurity – especially as digital transformation accelerates towards, and within, the cloud.
It’s the first of the Four Agreements – a set of universal life principles outlined in the bestselling book by Don Miguel Ruiz. After all, cybersecurity is too important to be cavalier about what is possible – within a particular use case, product, or service. Be impeccable with your words. Words can connect us, as well as divide us.
Troia recently published a book called Hunting Cybercriminals, A Hacker's Guide to Online Intelligence Gathering Tools and Techniques. The book reveals secrets of The Dark Overlord and other hacking groups which Troia communicated with through various dark web aliases. Hackers create a worm named after cybersecurity company.
The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs. R – Resilience, risk management, and regulatory compliance Cyber resilience is mission critical and enhances business value, as even the best cybersecurity cannot guarantee 100% protection.
Organizations developing a Security operations center(SOC) should consider which strategy they should adopt based on available cybersecurity professional resources: offensive or defensive? Are they experienced cyber warriors or recent additions to the cybersecurity field or resources moving over from traditional IT roles?
Aissi will lead cybersecurity for Blackhawk, including security strategy, engineering, infrastructure and governance, business continuity and third-party risk management. Aissi has received industry accolades for security innovation and leadership, including the 2019 and 2021 CISO of the Year Award and 2021’s Top 100 Global CISOs.
in Security Engineering, how she planned her journey to achieve her dream job and how her passion for cybersecurity had fueled her every step of the way. I am the founder and CEO of Cyber Pop-up , which is an on-demand cybersecurity service platform for small and medium sized businesses. What was your first cybersecurity job?
Hackers got into an email server at the FBI over the weekend to spread fake messages in an attempt to blame a cybersecurity expert for non-existent attacks, apparently in hopes of damaging his reputation. The hacking of the FBI email server appears to be the latest escalation in the campaign against Troia.
The information security industry needs both better tools to fight adversaries, and more people to do the fighting, says Fortinet Deputy CISO Renee Tarun in this interview with The Security Ledger Podcast’s Paul Roberts. Renee Tarun is the Deputy CISO and Vice President for Information Security at Fortinet Inc. Read the whole entry. »
Bryon Miller is co-founder and CISO at ASCENT Portal , a leading Software-as-a-Service (SaaS) platform for comprehensive security and continuous compliance management. The post Five Tips for Ensuring Communications Security in Your Organization appeared first on Cybersecurity Insiders.
Companies can sometimes struggle to operationalize the constant churn of threat intelligence divvied from the cybersecurity community, whether it be independent researchers or enormous vendors like Microsoft. It used to be the question that would always come up with CISOs: ‘who would want my information.’ Microsoft).
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content