This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Hurd Wayne Hurd , VP of Sales, Luminys Video Surveillance as a Service (VSaaS) advancements will provide more accurate threat detection that allows security teams to focus on real risks, minimizing false alarms. Security teams will need to address the unique risks posed using LLMs in mission critical environments. That’s the easy part.
Chris Clements, VP of Solutions Architecture at CISO Global “Hey Alexa, are you stealing my company’s data?” We have come to […] The post The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets appeared first on CISO Global.
A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.
There needs to be better corporate accountability, and that means CISOs need to fully document decisions by CEOs and boards to accept risks that are against the recommendation of company security leaders and experts. That, in turn, will help us to better design defensive strategies and tactics to thwart future attacks.
The rise in personal liability for CISOs and executives (as seen in cases like the SolarWinds lawsuit) has increased focus on governance structures that provide clear oversight, accountability, and protection for decision-makers. Where is cybersecurity governance going? Below are key trends shaping the future.
David Jemmett, CEO & Founder of CISO Global Unlike Western AI systems governed by privacy laws and ethical considerations, DeepSeek operates under a regime notorious for state-sponsored hacking, surveillance, and cyber espionage.
Those who do business within the United States will want to keep their eye on the status of Section 702 of the Foreign Intelligence Surveillance Act (FISA), which sets out procedures for physical and electronic surveillance and collection of foreign intelligence.
A healthcare CISO I mentored was frustrated by apparent lack of support for a medical device security program. We're not proposing surveillance; we're implementing guardrails that protect everyone while maintaining privacy." I worked with a bank CISO who was struggling to get approval for a cloud security program.
The Electronic Frontier Federation has a good explainer of the surveillance mechanism behind the world of online ads. MORE eBays CISO shares his thoughts on planning and security ROI. MORE High-level insights from a survey into CISO leadership and organisations.
The recent kerfuffle surrounding the Chinese surveillance balloon that sailed above Canada and the United States before meeting its demise off the southeastern coast of the United States has tongues wagging and heads scratching in equal measure.
California's Attorney General hopes that this settlement will highlight the fact the consumers have the right to fight commercial surveillance under the CCPA. CISOs, at a minimum, should know what data they collect, why they collect it (or conversely, why they don't delete or discard it), and what external entities have access to it.
In this fireside chat , O'Neill speaks with Abnormal Security CISO Mike Britton about today's security threats and how to protect your corporate data. O'Neill was part of the Special Surveillance Group as an FBI investigator and spent his life undercover 24-7.
An ISO 27000 series certification is valid for three years and requires an annual surveillance audit to ensure continued compliance for the lifespan of the certification. Josh Yavor, CISO, Duo Security, now part of Cisco. What’s the benefit of ISO 27001:2013, 27017:2015 and 27018:2019 certification to our customers?
It was apropos that Ray Yepes, newly appointed CISO for the State of Colorado, opened the 2022 SecureWorld Denver conference on October 6th. Ray Yepes, CISO for the State of Colorado, presents the opening keynote. Down the hall, Brenden Smith, CISO at FirstBank, presented "Revisiting Deception Systems: Enterprise Use Cases."
Howard Taylor, CISO of Radware, goes so far as to call it the “death of trust.” Yes, pentesting and other forms of surveillance can help spot external threats. One casualty of these supply chain attacks has been trust between businesses and their key vendors, suppliers, and even customers.
The opening lines of the lawsuit say it all: "Defendants are notorious hackers—amoral 21st century mercenaries who have created highly sophisticated cyber-surveillance machinery that invites routine and flagrant abuse.". Related with Rebecca Rakoski: Suing the CISO Podcast ]. And that's why Apple is suing.
This hurry has led to APT 41 and its sister actors The sense of urgency has also led to errors across geos revealing its modus operandi as well as the measures it is using to breach networks and maintain surveillance. What the future holds for APT 41?
An ISO 27000 series certification is valid for three years and requires an annual surveillance audit to ensure continued compliance for the lifespan of the certification. Josh Yavor, CISO, Duo Security, now part of Cisco. What’s the benefit of ISO 27001:2013, 27017:2015 and 27018:2019 certification to our customers?
The move was prompted by the pending Digital Markets Act There’s a strong overview of the surveillance technology landscape from privacy campaigner Johnny Ryan. The interview accompanies a report the Irish Council for Civil Liberties’ published in January, documenting the scope of this surveillance.
They are words that could strike fear into the heart of a CISO, Chief Risk Officer, or corporate counsel. Would not such an adversary wish me to go to a place of his choosing, knowing that an amateur will be unlikely to detect his surveillance? Not to mention military leadership. A Nuclear Engineer for the U.S.
The course consists of four modules: Hackers Exposed: You will find out methods that stop hackers, block tracking, and prevent government surveillance. Cybersecurity: The CISO’s View: You’ll know about the pillars and rules that assure cybersecurity, find out about the role of the Chief Information Security Officer.
Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. Christine Bejerasco, CISO of WithSecure , expands that “in the physical dimension, poisoning the well could impact communities in the area.
North Korea-linked APT Diamond Sleet supply chain attack relies on CyberLink software New InfectedSlurs Mirai-based botnet exploits two zero-days SiegedSec hacktivist group hacked Idaho National Laboratory (INL) CISA adds Looney Tunables Linux bug to its Known Exploited Vulnerabilities catalog Enterprise software provider TmaxSoft leaks 2TB of data (..)
These challenges include bias and discrimination embedded in algorithms, privacy violations due to enhanced surveillance capabilities, and the difficulty of assigning accountability for decisions made by AI systems. Useful resources include: The Professional Association of CISOs at [link].
That headache is real, of course, but accountants and lawyers will step up to sort it out," said Mike Wilkes , Former CISO, MLS; Adjunct Professor, NYU. So what should CISOs do? This will be a major challenge to CISOs everywhereand it won't get better anytime soon. given the tensions around core economic impacts of the tariffs.
Armed with uses cases and identifying the conditions that prompt the People's Republic of China (PRC) to commit cyber offensives, a 76-page report from Booz Allen Hamilton presents a framework for anticipating and interpreting PRC attacks and helps CISOs identify factors that increase an organization's risk from cyberattacks.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content