This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The purpose of STEMatch is to make the opportunities that are created by STEM education more visible, accessible and affordable for people that are underrepresented in our industry,” Chris Zannetos, creator of CSO50 recognized project STEMatch tells CSO. STEMatch is one such program.
Education and research were the top targets for cyberattackers in 2021, with an average of 1605 attacks per organization per week, a 75% increase from 2020, according to research by Check Point Software Technologies. The COVID-19 pandemic has pushed staff in businesses and education to work from home.
Check out these 11 phishing prevention tips for best technology practices, employee education and social media smarts. | Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here
Get the latest from CSO by signing up for our newsletters. ]. Indeed, the hospital’s vast databases span healthcare, education, and research operations with some reliant on legacy, end-of-life systems that needed shifting to the cloud for greater flexibility, cost-effectiveness, and security. The pandemic accelerated things of course.”
Sign up for CSO newsletters. ]. No matter what your situation is, here are the aspects of your education, skills, and experience to highlight to ensure your resume stands out in the crowd. To read this article in full, please click here
To further facilitate the transition into a career in cybersecurity and close the skills gap, Fortinet’s NSE Training Institute has created education pathways, which allows individuals to navigate their educational journey from training to careers and helps organizations upskill employees to meet their changing needs.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »
Sign up for CSO newsletters. ]. The group has targeted entities in the US including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks, and NGOs. The flaws allow the extraction of mailbox contents and the installation of backdoors on vulnerable servers.
Cybersecurity advisory firm ISTARI is partnering with the Cambridge Judge Business School (CJBS) at the University of Cambridge to deliver global education aimed at elevating technical cybersecurity leaders into “transformative business leaders.”
One such provider of enterprise software solutions for the higher education sector selected AWS to obtain the network coverage and server scalability that it needed. To succeed, they must have the compute, networking, and security infrastructure to back up their service promises.
Let’s walk through some practical steps organizations can take today, implementing zero trust and remote access strategies to help reduce ransomware risks: •Obvious, but difficult – get end users to stop clicking unknown links and visiting random websites that they know little about, an educational challenge. Food for thought, eh!
That means cybersecurity training and education so that key stakeholders understand the risks that businesses are facing, and which strategies are most effective for protection. Even if a company employs a Chief Information Security Officer (CISO) or Chief Security Officer (CSO), the position may still report to the CIO.
At Microsoft, we pride ourselves on educating everyone — not just security teams — on best practices and the latest attack vectors. Comprehensive cybersecurity education is an important part of strengthening cyber defenses for corporate IT professionals, small businesses, and everyday consumers alike.
One answer to filling the skills gap is to tap and hire underrepresented candidates, however, providing them with the educational resources and skill-building opportunities is yet another challenge. Access to cybersecurity education is not always accessible to these groups, which typically leads them to pursue other career paths.
(Source: ISACAs Tech Workplace and Culture 2025 report, March 2025) For more information about recruiting and retaining cybersecurity professionals: 10 Ways to Boost Cybersecurity Talent Retention (InformationWeek) 60% of cybersecurity pros looking to change employers (CSO) The cybersecurity industry has an urgent talent shortage.
Video Podcast ] | [ MP3 ] | [ Transcript ] Editor’s note: since recording this conversation with Tanya, We Hack Purple was acquired by Semgrep , where Tanya Janca in now the Head of Community and Education. Tanya Janca is the founder of We Hack Purple and the ead of Education and Community at Semgrep!
Cyberattacks are so sophisticated these days that even with the best education and training, employees inadvertently click links or download documents that look all too real.
A survey of U.S. and UK residents conducted by Censuswide and commissioned by identity verification vendor Onfido released today said that popular culture – specifically, true-crime shows and movies – are having an outsized effect on the public’s understanding of cybercrime.
This immersive form of education allows us to develop and maintain a secure environment outside of the workplace, as well as in it. Typically, corporate networks are equipped with firewalls, a Chief Security Officer (CSO), and a whole cybersecurity department to keep them safe. What about a C-level executive?
Iranian state-sponsored threat actor, Educated Manticore, has been observed deploying an updated version of Windows backdoor PowerLess to target Israel for phishing attacks, according to a new report by Check Point. To read this article in full, please click here
The education sector is a top target for cybercriminals, and faces “an unusually large percentage” of social engineering attacks, according to the 2021 Verizon Data Breach Investigations Report. The coronavirus pandemic, which spurred many individuals to study and work remotely, added to the industry’s challenges.
industry, notably Colonial Pipeline in May, and have afflicted hundreds of healthcare and educational institutions. These actions were undertaken to stem the alarming and growing tide of ransomware attacks that have hit U.S. To read this article in full, please click here
CEH (sometimes written as C|EH ) is probably the most famous certification offered by the International Council of Electronic Commerce Consultants, or EC-Council , a cybersecurity education and training nonprofit founded in the wake of the 9/11 attacks. There are two levels of CEH certification.
The JCDC’s mission, according to CISA , is to “leverage new authorities” and “bring together public and private sector entities to unify deliberate and crisis action planning while coordinating the integrated education of these plans.
He has been in the information security and technology field for the past 20 years working in education, financial, telecommunication, healthcare, and insurance sectors. Fred Kwong is VP and CISO at DeVry University and is based in Chicago, IL. He also serves as an adjunct faculty member at Roosevelt and Benedictine Universities.
A key component of these aims is supporting cyber education, skills and career pathways in the UK. It develops, promotes and stewards standards for cybersecurity in support of the UK Government’s national cybersecurity strategy. To read this article in full, please click here (Insider Story)
Judge has faced the same problem, finding that many philanthropic organizations don’t think cyber aligns with their areas of interest, be it economic development and disparity, education or mental health. These includes finance, education and social media giants. But it really does.
A lack of cohesion between software development teams and cybersecurity functions compounds the software supply chain risks faced by organizations, making it all the more urgent for cybersecurity leaders and their teams to better engage with and educate developers.
In doing so, I had to educate myself on what they value and realized the many differences between Gen Z and previous generations. In 2022, I started a podcast aimed at converting more Gen Z to seek careers in cybersecurity. Gen Z refers to those born between mid-to-late 1990s and 2010, making them between the ages of 11 and 28.
If you’re Keatron Evans, principal security researcher at security education provider InfoSec, the history major gets the job. The other has an advanced degree in computer science, with a focus on cybersecurity, and 10 years’ experience in pentesting and security operations center environments. Which candidate do you hire?
Ransomware gangs accelerated their attacks on healthcare, education, and business organizations, culminating in significant incidents that brought down leading U.S. oil pipeline company Colonial Pipeline and the North American operations of a major meat supplier, JBS.
Plus, a recent report by the Mineta Transportation Institute doubled down on the need for C-level security and technical expertise—for instance, hiring a chief security officer (CSO) or chief information security officer (CISO).
By Amanda Fennell, CSO and CIO, Relativity. Exceptional educators know that it’s a mistake to drone on about basics and not offer thoughtful challenges and problem-solving quests to learners. Amanda joined the Relativity team in 2018 as CSO and her responsibilities expanded to include the role of CIO in 2021.
Below is our esteemed panel of SC Awards judges, contributing from health care, engineering, finance, education, manufacturing, nonprofit and consulting, among others. She has over two decades of experience as a cybersecurity professional and over 10 years of experience as a professional educator.
This is why it is critical for our children to be educated about Internet safety from an early age and have a foundational baseline of cyber awareness. As a result, young children have become an especially vulnerable target for cybercriminal, due to their lack of knowledge of cybercriminals and their tactics.
Enhance efforts to educate individuals and organizations about online safety, cyber best practices and cyber incident reporting. Strengthen international collaboration by sharing cyberthreat information, conducting joint investigations and taking coordinate actions against cybercrime networks.
Today, DevSecOps is following that upward curve, with adopters trying to educate mainstreamers on the benefits, while the yet-to-be convinced often struggle to make sense of common misconceptions. Like DevOps, DevSecOps comprises equal parts culture, process, and tooling.
national cyber director’s action concerning educating and developing the national cyber workforce, as well as expanding the hiring authorities for cyber positions, and establishing “special pay rates for the most in-demand roles.” Additionally, the report included a plethora of recommendations for the U.S.
Believed to have launched in December 2021, Ransom Cartel has made victims of organizations from among the education, manufacturing, utilities, and energy sectors with aggressive malware and tactics that resemble those used by REvil. To read this article in full, please click here
The goal of the month-long event is to educate the government and industry about the dangers posed by insider threats and the role of insider threat programs. On September 1, a crew of US government offices launched the fourth-annual National Insider Threat Awareness Month (NITAM).
The list aims to educate developers, designers, architects, managers, and organizations about the potential security risks when deploying and managing LLMs, raising awareness of vulnerabilities, suggesting remediation strategies, and improving the security posture of LLM applications, OWASP said.
A group of over 90 women working in cybersecurity roles have formed The Forte Group, a non-profit organization for the education and advocacy of women in the cybersecurity industry. The voluntary group is headquartered in California but is offering a global membership. The group was formed informally earlier during the pandemic.
That’s according to a report from the BBC which claimed that children’s SEN information, child passport scans, staff pay scales and contract details have been stolen by notorious cybercrime group Vice Society, known for disproportionately targeting the education sector with ransomware attacks in the UK and other countries.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content