This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyberrisk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »
Information Technology (IT) primarily refers to hardware, software, and communications technologies like networking equipment and modems that are used to store, recover, transmit, manipulate, and protect data. . Operational technology has seen innovations that allowed it to become safer, more efficient, and more reliable.
Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. This ruling still has a gap in addressing the cybersecurity talent shortage. After all, a CISO can't do it all.
The post Episode 209: Fortinet’s Renee Tarun on Scaling InfoSec To Meet Tomorrow’s Challenges appeared first on The. Fixing InfoSec Demands Scale, Diversity. Read the whole entry. » The information security industry is simultaneously robust and beset by problems and challenges.
In partnership with senior executives, they need to pay close attention to the risks their companies face and the strategies those companies put in place to comply. As the rules were authorized in late 2023, we shared what we see as the implications for infosec leaders. Check Point Software Technologies Ltd. Avaya Holdings Corp.,
This morning, Critical Start released its first ever CyberRisk Landscape Peer Report , which explores some of the major concerns and challenges currently confronting cybersecurity leaders as they manage risk within their organizations. Here are some comments on the cyberrisk landscape from cybersecurity vendor experts.
BOSTON–( BUSINESS WIRE )– CyberSaint , the developer of the leading platform delivering cyberrisk automation, today announced that the company is seeking speaker submissions for its virtual STRONGER conference, set to occur September 13th-15th 2022. InfoSec 360. Abstracts for each of the themes can be found below.
With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyberrisks to OT environments.
A seemingly arcane topic, every organization should have vulnerability management as top-of-mind when it comes to managing cyberrisk. Since the end of 2020, we have witnessed the increasing prevalence of coercion through technology. Finnish infosec pros organized to track and protect patients from further abuse.
We talk about the growing demand for security automation tools and how the chronic cyber security talent shortage in North America and. In this podcast, we talk about the growing demand for security automation tools and how the chronic cyber security talent shortage in North America and elsewhere is driving investment in automation.
The post Episode 207: Sarah Tatsis of BlackBerry on finding and Keeping Women in Cyber. We continue our observance of women’s history month by speaking with Sarah Tatsis , who is the Senior Vice President of the Advanced Technology Development Labs at BlackBerry. Read the whole entry. »
The post Episode 207: Sara Tatsis of Blackberry on finding and Keeping Women in Cyber. We continue our observance of women’s history month by speaking with Sarah Tatsis , who is the Senior Vice President of the Advanced Technology Development Labs at BlackBerry. Read the whole entry. »
The SEC announced its new cyber incident disclosure rules on July 26, 2023, when it appeared the rules were effective immediately. We covered the new rules on July 31, with some thoughts from InfoSec leaders. Immediately or not, Dec. 15 is now here, and the new rules will be in effect.
The trend of cybersecurity as a business driver rather than a technology issue has been developing for some time – yet it remains difficult to get executive and board-level buy-in for cybersecurity. InfoSec professionals tend to describe the benefits of a strong cybersecurity program with technical jargon and acronyms.
Threat intelligence solutions using AI/ ML technologies can prevent false positives and reduce alert fatigue – helping cybersecurity professionals focus on strategic priorities instead of spending all their time reacting to security alerts and potential incidents. Cyber insurance becomes mainstream discussion.
With technological innovations like cloud computing, AI/ML, the Internet of Things, and more making cyberrisks even more complex, qualified talent is hugely in demand. Cybersecurity is one of the fastest-growing professions, with demand far outpacing supply even in normal economic conditions.
The city has a more established IT setup, including a full-time IT director, which many of the smaller towns lack, according to this Government Technology article. Brennan is speaking at SecureWorld Chicago on June 8, tackling the topic of "I Can See Clearly Now, the Threats Are Gone: The State of InfoSec and Threat Intelligence Today."
What is the CISA: Cyber Essentials Toolkit? And the Cyber Essentials Toolkit is a set of modules concentrating vital advice for IT and InfoSec into bit-sized pieces for employees and leaders to implement. CISA says it wants to break cybersecurity down to a series of essentials.
Ultimately, he believes “this is good for businesses as, through the insurance process, they will gain better visibility into their cyberrisks and measures they can deploy to keep digital operations secure and compliant to data privacy regulations.”. billion in premium. What might that include? But much will rely on regulation.
Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. This reinforces "Identity as the Digital Perimeter" and dynamically enacts the security of each connection based on the trifecta of Identity, Device Posture, and Session Risk.
Wherever your business takes you, risk will follow you closely. Whether you’re expanding into new markets, adopting cutting-edge technologies, or partnering with third-party vendors, risks are about as unavoidable as Monday morning meetings. For example, banks using fintech solutions face new cyberrisks.
In this Spotlight Edition of the podcast we're speaking with RSA Chief Technology Officer Zulfikar Ramzan about how his company is adapting to help its customers confront the dark side of digital transformation initiatives: increased digital risk, including from cloud, artificial intelligence and the Internet of Things.
Our kids are growing up in an increasingly technological world – we need to provide them with the resources and education to navigate it in a smart and safe way. Ask them for a quick virtual coffee or phone call, get out to the many infosec events, and engage with the community ! Start Cybersecurity Education Early.
Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. DXC Technology. DXC Technology. SafeBreach holds multiple patents and awards for their BAS technology.
Related Stories Episode 162: Have We missed Electric Grid Cyber Attacks for Years? Also: Breaking Bad Security Habits Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Spotlight Podcast: Rethinking Your Third Party CyberRisk Strategy.
» Related Stories Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Episode 159: Deep Fakes and Election (in)Security with ZeroFOX Spotlight Podcast: Rethinking Your Third Party CyberRisk Strategy. Read the whole entry. » grid happened in March of this year.
When it comes to cyberrisks, the most up-to-date cybersecurity technology or regimented program doesn’t make an organization immune to an attack. Operating with a team of individuals who are cybersecurity savvy is one of the best tools for cyberrisk management. Keep human user experience (UX) top of mind.
Infosec teams may have a false sense of security when critical servers are equipped with EDR technology and redundant logging. Block IP: This Playbook blocks IP addresses using associated technologies like EDR or a firewall.
R is for Real-Time Risk Improved real-time risk monitoring and identification capabilities using modern technologies, including alerts and notifications, allow faster response to a dynamic threat landscape. Using powerful data analytics, HighBond gives users in-depth insights without technological experience.
Infosec teams may have a false sense of security when critical servers are equipped with EDR technology and redundant logging. Block IP: This Playbook blocks IP addresses using associated technologies like EDR or a firewall.
It combines the power of technology, AI, and automation with human intelligence to optimize the IT security monitoring, incident detection, and incident response times of enterprises globally. Along with these contributions, Robert is active in a number of impactful infosec initiatives. Connect with Robert. Connect with Adam.
This means learning from the successes and the failures and using those learnings to enhance security measures, standards, and technology. When it comes to ransomware, the most up-to-date cybersecurity technology or regimented program doesn’t make an organization immune to an attack. In the U.S., The next steps are up to you.
To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. Back then Paul was writing infosec stories for IDG and I was doing the same at ZDNet.
To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. Back then Paul was writing infosec stories for IDG and I was doing the same at ZDNet.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content