article thumbnail

“Cybersecurity For Dummies” Second Edition Now Available

Joseph Steinberg

The second edition of Cybersecurity For Dummies , Joseph Steinberg’s best-selling introductory-level book about cybersecurity, is now available. And, of course, all versions of CyberSecurity For Dummies will also help guide you in the event that your information has already been compromised. Basic cybersecurity concepts.

article thumbnail

NIST Cybersecurity Framework 2.0

Schneier on Security

of the Cybersecurity Framework: The CSF 2.0, which supports implementation of the National Cybersecurity Strategy , has an expanded scope that goes beyond protecting critical infrastructure, such as hospitals and power plants, to all organizations in any sector. NIST has released version 2.0 ’s newly added Govern function.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Event Cancelled After Being Hit By Cybercriminals

Joseph Steinberg

An online cybersecurity event with 2,500 people already logged in had to be cancelled after suspected cybercriminals launched a social engineering attack in the event’s chat window. Shortly after such messages appeared, the AICD, in order to protect attendees, cancelled the event, and contacted local law enforcement.

article thumbnail

On the Cybersecurity Jobs Shortage

Schneier on Security

In April, Cybersecurity Ventures reported on extreme cybersecurity job shortage: Global cybersecurity job vacancies grew by 350 percent, from one million openings in 2013 to 3.5 million in 2021, according to Cybersecurity Ventures. The number of unfilled jobs leveled off in 2022, and remains at 3.5

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Tech leaders today are facing shrinking budgets and investment concerns. Download today to learn more!

article thumbnail

IBM Sells Cybersecurity Group

Schneier on Security

It became part if IBM’s cybersecurity offerings, mostly and weirdly subservient to QRadar. QRadar was IBM’s first acquisition in the cybersecurity space, and it saw everything through the lens of that SIEM system. In 2016, IBM bought Resilient Systems, the startup I was a part of.

article thumbnail

Roger Grimes on Prioritizing Cybersecurity Advice

Schneier on Security

For example, we are often given a cybersecurity guideline (e.g., The catch is: There are two recommendations that WILL DO MORE THAN ALL THE REST ADDED TOGETHER TO REDUCE CYBERSECURITY RISK most efficiently: patching and using multifactor authentication (MFA). PCI-DSS, HIPAA, SOX, NIST, etc.) with hundreds of recommendations.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

As AI evolves, enhanced cybersecurity and hiring challenges grow. IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

In this eBook, we will look at the 2023 report and explore the most important cybersecurity stats and how to prevent them. The annual FBI Crime Report provides detailed statistics on crime at the national, state, and local levels.

article thumbnail

Cybersecurity Predictions for 2024

We’ve recently looked back at what happened within cybersecurity in 2023. In this eBook—with some guidance from the Google Cloud Cybersecurity Forecast 2024—we will delve into some of the most anticipated trends, threats, and cutting-edge solutions that are set to define the cybersecurity landscape in the months ahead.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Today’s technology leaders play a more strategic role in establishing cybersecurity strategy for their organizations. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?”

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

This report offers insights for cybersecurity, compliance, and privacy executives at healthcare organizations, as well as for policymakers and auditors.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device.

article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

It’s mindboggling, but right now for 49% of respondents, cybersecurity is their primary business concern. As a result, data protection needs to be a concern for most banks, businesses, and information technology specialists.