This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyberthreats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. For Hacking.
A greater focus on succession planning may help improve continuity in leadership, particularly in terms of ongoing relationships with higher education, local government, and federal officials. States are seeing significant turnover among cybersecurity leadership, and filling these vacancies can take six months or more.
(Source: ISACAs Tech Workplace and Culture 2025 report, March 2025) For more information about recruiting and retaining cybersecurity professionals: 10 Ways to Boost Cybersecurity Talent Retention (InformationWeek) 60% of cybersecurity pros looking to change employers (CSO) The cybersecurity industry has an urgent talent shortage.
Enhance efforts to educate individuals and organizations about online safety, cyber best practices and cyber incident reporting. Strengthen international collaboration by sharing cyberthreat information, conducting joint investigations and taking coordinate actions against cybercrime networks. Kirsten Gillibrand (D-N.Y.)
Judge has faced the same problem, finding that many philanthropic organizations don’t think cyber aligns with their areas of interest, be it economic development and disparity, education or mental health. These includes finance, education and social media giants. Social media… is one of the largest threat vectors,” said Judge.
Plus, a recent report by the Mineta Transportation Institute doubled down on the need for C-level security and technical expertise—for instance, hiring a chief security officer (CSO) or chief information security officer (CISO).
Sonatype has discovered more malware in the npm registry which, following our analysis and multiple cyberthreat intelligence reports, has led to the discovery of a novel and large scale malware campaign leveraging the open-source ecosystem. Pierluigi Paganini. SecurityAffairs – hacking, CursedGrabber malware).
My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said. “If Those who pursue an in-depth technical education in all areas of information security are the target audience for the GSE certification.”
However, this revolution has also introduced a new vulnerability – cyberthreats. This threat has not spared any layer of society or any tier of professional hierarchies, including C-Suite executives. Digital technology has brought about unprecedented conveniences and efficiencies, transforming how we work and live.
VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyberthreat. Cloud security success and choosing the right investments is all about having a clear understanding of threat types and their resulting damages.
“Once access has been gained, the threat actor may pursue additional activity, such as deploying malicious code to achieve persistent access to the target’s network,” CISA’s alert reads. To get more details, check out the CISA alert “ Foreign Threat Actor Conducting Large-Scale Spear-Phishing Campaign with RDP Attachments. ”
At the end of the day, lack of education and human error are two of the largest contributors to data breaches. Cyber attacks nowadays do not often come from ingenious ‘hackers’ in dark rooms, they’re often the result of an employee reusing the same password, or businesses not implementing basic practices such as multi-factor authentication.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content