article thumbnail

Roger Grimes on Prioritizing Cybersecurity Advice

Schneier on Security

For example, we are often given a cybersecurity guideline (e.g., The catch is: There are two recommendations that WILL DO MORE THAN ALL THE REST ADDED TOGETHER TO REDUCE CYBERSECURITY RISK most efficiently: patching and using multifactor authentication (MFA). PCI-DSS, HIPAA, SOX, NIST, etc.) with hundreds of recommendations.

article thumbnail

Women in Cybersecurity & IWD: Why I’m Done!

Jane Frankland

For nearly a decade, we’ve heard the same discussion in cybersecurity circles about the gender diversity problem. Yet here we are, in 2025, and the percentage of women in cybersecurity remains stagnantor worse, is backtracking. Meanwhile, cybersecurity job vacancies are skyrocketing. It’s utter madness.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BEWARE: Criminals Are Selling Fraudulent Expert Opinion Letters From “Me” In Support of CyberSecurity Professionals Seeking Immigration Visas to The United States

Joseph Steinberg

The post BEWARE: Criminals Are Selling Fraudulent Expert Opinion Letters From Me In Support of CyberSecurity Professionals Seeking Immigration Visas to The United States appeared first on Joseph Steinberg: CyberSecurity Expert Witness, Privacy, Artificial Intelligence (AI) Advisor.

article thumbnail

CyberSecurity Expert Joseph Steinberg To Lecture At Columbia University During Summer 2025

Joseph Steinberg

During the upcoming Summer 2025 semester, cybersecurity expert Joseph Steinberg will once again lecture at Columbia University. The post CyberSecurity Expert Joseph Steinberg To Lecture At Columbia University During Summer 2025 appeared first on Joseph Steinberg: CyberSecurity Expert Witness, Privacy, Artificial Intelligence (AI) Advisor.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles.

article thumbnail

Cybersecurity Lessons from Covid19

Adam Shostack

What can Cybersecurity learn from the covid pandemic? COVID-19 offers an opportunity and call to action for cybersecurity professionals, policy makers, and the public to think about preparation and response to catastrophic digital threats. Join us for a provocative exploration on Thursday!

article thumbnail

Lessons for Cybersecurity from the American Public Health System

Adam Shostack

The white papers attempt to portray a comprehensive picture of the computing research field detailing potential research directions, challenges, and recommendations.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

As AI evolves, enhanced cybersecurity and hiring challenges grow. IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines. Join us and learn how to better advise your agency clients on strategy, architect Zero Trust solutions, and win more cybersecurity business!

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

In this eBook, we will look at the 2023 report and explore the most important cybersecurity stats and how to prevent them. The annual FBI Crime Report provides detailed statistics on crime at the national, state, and local levels.

article thumbnail

Cybersecurity Predictions for 2024

We’ve recently looked back at what happened within cybersecurity in 2023. In this eBook—with some guidance from the Google Cloud Cybersecurity Forecast 2024—we will delve into some of the most anticipated trends, threats, and cutting-edge solutions that are set to define the cybersecurity landscape in the months ahead.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Tech leaders today are facing shrinking budgets and investment concerns. Download today to learn more!

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Today’s technology leaders play a more strategic role in establishing cybersecurity strategy for their organizations. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?”

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

This report offers insights for cybersecurity, compliance, and privacy executives at healthcare organizations, as well as for policymakers and auditors.