This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Education and research were the top targets for cyberattackers in 2021, with an average of 1605 attacks per organization per week, a 75% increase from 2020, according to research by Check Point Software Technologies. The COVID-19 pandemic has pushed staff in businesses and education to work from home.
Check out these 11 phishing prevention tips for best technology practices, employee education and social media smarts. | Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »
Let’s walk through some practical steps organizations can take today, implementing zero trust and remote access strategies to help reduce ransomware risks: •Obvious, but difficult – get end users to stop clicking unknown links and visiting random websites that they know little about, an educational challenge. Food for thought, eh!
That means cybersecurity training and education so that key stakeholders understand the risks that businesses are facing, and which strategies are most effective for protection. Even if a company employs a Chief Information Security Officer (CISO) or Chief Security Officer (CSO), the position may still report to the CIO.
(Source: ISACAs Tech Workplace and Culture 2025 report, March 2025) For more information about recruiting and retaining cybersecurity professionals: 10 Ways to Boost Cybersecurity Talent Retention (InformationWeek) 60% of cybersecurity pros looking to change employers (CSO) The cybersecurity industry has an urgent talent shortage.
Below is our esteemed panel of SC Awards judges, contributing from health care, engineering, finance, education, manufacturing, nonprofit and consulting, among others. For 2021, the judges took on a record number of submissions, identifying which products, people and companies stood out during a tumultuous year.
He has been in the information security and technology field for the past 20 years working in education, financial, telecommunication, healthcare, and insurance sectors. A : The ever-changing technology and threats that come along with it. A : The ever-changing technology and threats that come along with it.
In doing so, I had to educate myself on what they value and realized the many differences between Gen Z and previous generations. This means they grew up experiencing a much faster rate in which technology evolves. In 2022, I started a podcast aimed at converting more Gen Z to seek careers in cybersecurity.
Today, DevSecOps is following that upward curve, with adopters trying to educate mainstreamers on the benefits, while the yet-to-be convinced often struggle to make sense of common misconceptions. But as more organizations adopt cloud and container technology, they can’t afford to leave security to the last minute.
Plus, a recent report by the Mineta Transportation Institute doubled down on the need for C-level security and technical expertise—for instance, hiring a chief security officer (CSO) or chief information security officer (CISO). Our number one priority is maintaining the trust, security and privacy of our customers, their patrons and data.
Judge has faced the same problem, finding that many philanthropic organizations don’t think cyber aligns with their areas of interest, be it economic development and disparity, education or mental health. These includes finance, education and social media giants. But it really does.
Watch the on-demand webinar , in which Phillip Hayes, Tenables Director of Information Security, and Michael Garman, Tenables Senior Manager of Technology Engineering, discuss a variety of cloud security best practices. bill seeks tougher punishments for cybercrimes A bill introduced by two U.S.
By Amanda Fennell, CSO and CIO, Relativity. Exceptional educators know that it’s a mistake to drone on about basics and not offer thoughtful challenges and problem-solving quests to learners. Amanda joined the Relativity team in 2018 as CSO and her responsibilities expanded to include the role of CIO in 2021.
Network operators worldwide have rushed to upgrade network infrastructure to meet increased demand for bandwidth and throughput driven by remote work and education. In many cases, this has resulted in service providers accelerating timelines for 5G and other high-bandwidth access technologies.
Workforce challenges persist, with states finding it difficult to hire and retain professionals who understand AI technologies and their security implications. We have a perfect blend of amazing technology professionals learning, growing, and driving results together." Proactively participate in policy development.
In this campaign, the affected organizations span the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors.” To read this article in full, please click here
Sonatype’s world-class open source intelligence, which includes our automated malware detection technology, safeguards your developers, customers, and software supply chains from infections like these. In his spare time, he loves exploiting vulnerabilities ethically and educating a wide range of audiences. Pierluigi Paganini.
As digital innovation continues to transform and expand networks, much of the workforce now working remotely, and technologies like 5G making networks faster and more open, opportunities for threat actors have ballooned.
These resources should provide insights into the organization's risk appetite, technological maturity, and strategic objectives. Pay close attention to past technology investments, previous security approaches, and the organization's historical response to technological and risk challenges.
A : You never get bored with the ever-changing risks, problems, or new technology to learn about! A : This might be different than the usual answer of something like cybersecurity education, but for me I will say communicating why this all matters and why it's important to care about it.
Many users and organizations are struggling to keep pace with the education and training needed to comprehensively understand and protect these technologies. In 2025, CISOs will be challenged to strike a balance between driving forward technological adoption and ensuring the security and resilience of these tools.
My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said. “If Those who pursue an in-depth technical education in all areas of information security are the target audience for the GSE certification.”
In this insightful CISO roundtable conversation from three distinct industries – security, technology and consulting, cybersecurity leader Rick Howard from The CyberWire moderates a candid and in-depth conversation with leading CISOs, Jeff Peal from SullivanCotter, Mike Johnson from Fastly and Jadee Hanson of Code42.
Sherry brought to Princeton his 25 years of technology experience, 12 of which was in higher education as the former CISO at Brown University. Security is now a programmatic, or an automatic, part of evaluating a technology the university would like to utilize. So he clearly understood the scope of the effort. "In
Unraveling the True Security Risks ” (SecurityWeek) “ How deepfakes threaten biometric security controls ” (TechTarget) “ Deepfakes break through as business threat ” (CSO) 3 - Fake update variants dominate list of top malware in Q3 Hackers are doubling down on fake software-update attacks.
Digital technology has brought about unprecedented conveniences and efficiencies, transforming how we work and live. However, this revolution has also introduced a new vulnerability – cyber threats. This threat has not spared any layer of society or any tier of professional hierarchies, including C-Suite executives.
It could be your IT systems, your operation technology, your IoT, your industrial control systems, or SCADA environments.". Critical Start's Brad Anderson said educating an enterprise business's board and executive leadership team about the threat of breaches and that one likely will happen is important. "I
The contemporary world has witnessed the rise of the Internet and global communication, and collaboration technologies, including mobile data use and the culture of bring your own device [BYOD]. VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyber threat.
She has 15 years of experience, and yet she's not a CSO at any large organization, rather than curse her fate, she decided to help others, so that maybe they can become the CSOs, and just maybe start to address the diversity problem in InfoSec. When I look at my resume, like it's pretty strong, you know, both in terms of my education.
She has 15 years of experience, and yet she's not a CSO at any large organization, rather than curse her fate, she decided to help others, so that maybe they can become the CSOs, and just maybe start to address the diversity problem in InfoSec. When I look at my resume, like it's pretty strong, you know, both in terms of my education.
Brian Krebs is an independent investigative reporter known for his coverage of technology, malware , data breaches , and cybercrime developments. Longtime network and system administrator Jack Daniel is a technology community activist, mentor, and storyteller. Markstedter actively contributes to filling the infosec education gap.
Industry leaders from the technology, financial, and education sectors have pledged a wide range of private-sector initiatives to tackle the nation’s cybersecurity problems. Get the latest from CSO by signing up for our newsletters. ]. Get the latest from CSO by signing up for our newsletters. ].
President Biden’s wide-ranging cybersecurity executive order issued last May directs the National Institute of Standards and Technology (NIST) to create pilot labeling programs to educate the public on the security of the internet-of-things (IoT) devices and software products they buy.
At the end of the day, lack of education and human error are two of the largest contributors to data breaches. Instead, a mature posture will combine a variety of security methodologies and technologies for data discovery, classification, access management, protection, and more. Wes Spencer, VP, External CSO, ConnectWise.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content