This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of social engineering. The employees at your organization are badly in need of securityawareness training. Infosec’s Jack Koziol. What do you do? Engage them with gamified, interactive lessons.
“Awareness programs are great for a number of reasons, but they do not take priority over the daily fire drills that most security teams face,” said Brian Johnson, chief security officer at Armorblox. Just under 40 percent of respondents said they spent only 10% of their time on securityawareness.
This week, Chloé helps a newbie explore the world of InfoSec. Dear Chloé, I’ve been looking into cybersecurity, but don’t know where to even begin. The post Ask Chloé: Where to Begin In InfoSec appeared first on Security Boulevard. What are the first.
This week, Chloé explores hackers’ rights and the challenges women face in the male-dominated world of cybersecurity. The post Ask Chloé: Hackers’ Rights and Women in Infosec appeared first on Security Boulevard. Dear Chloé, I came across your talk on hacker rights. Since watching.
The post US Helped Ukraine With Infosec—Story is ‘Dangerous Arrogance’ appeared first on Security Boulevard. But scratch the surface and there’s not much of a There there. What looks like a coordinated PR campaign relies on “people familiar with the.
Information security (InfoSec) risk management with third parties, including outsourcing, requires persistence and consistency due to the primary business risk it presents. Third-party managers need to have insights into a variety of areas of information security, including.
Seen here, training underway through NIST’s National Initiative for Cybersecurity Careers & Studies. Nearly 70 percent of employees polled in a new survey said they recently received cybersecurity training from their employers, yet 61 percent nevertheless failed when asked to take a basic quiz on the topic.(NIST).
Five steps to take that will allow the infosec team to reduce the risk of trailing the latest transformation changes. The post Cyber Agility Mandate – Transforming InfoSec Programs to Meet Evolving Markets appeared first on Security Boulevard.
I have attended numerous security conferences over the past several years, and at each one, I repeatedly hear about the importance of information security being incorporated within the planning and requirement analysis phase of the software development life cycle (SDLC). I agree – this is very important.
The post Reducing InfoSec Threats Takes a Village appeared first on Security Boulevard. Chief executive officers and chief technology officers know this is a potentially existential threat both for their companies and for them professionally. As a result, executives are looking to.
Charlene O’Hanlon talks with Keatron Evans, principal security researcher at Infosec Institute, about their partnership with CISA that provides free cybersecurity resources, content, tools, training and other information. The post Infosec, CISA Partner to Provide Security Resources appeared first on Security Boulevard.
Global inflation can have, and is having, a significant impact on cybersecurity. As prices rise, organizations may be tempted to cut back on cybersecurity spending, making them more vulnerable to cyberattacks. Additionally, inflation can make it more difficult for organizations to keep up with the latest cybersecurity threats.
It was a master class in social engineering, one that put an organization’s security posture at risk. Social engineering attacks like phishing take advantage of an employee’s awareness of. The post Reaction to Social Engineering Indicative of Cybersecurity Culture appeared first on Security Boulevard.
A new cheatsheet from four infosec agencies tells us how to use PowerShell for good, rather than let scrotes misuse it to “live off the land.”. The post NSA Wants To Help you Lock Down MS Windows in PowerShell appeared first on Security Boulevard.
Seven small coastal towns in Massachusetts have formed a partnership to better tackle their IT and cybersecurity needs in the region. Tom Brennan is the Executive Director, Americas Region, at CREST, a global community of cybersecurity businesses and professionals working to keep information safe in a digital world.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Mário João Fernandes, born and raised in Mozambique, has been working in the banking sector for 29 years and has been fulfilling dedicated security roles in the cybersecurity space for over 11 years.
A commissioned survey of 600 InfoSec and IT professionals across those same seven countries. This year's report highlights: Trends and issues that influenced the security landscape in 2021. End-user awareness gaps and cybersecurity behaviors that could be introducing preventable risk within your organization.
Award-winning security transformation manager and digital anthropologist Lianne Potter joins us to discuss the fascinating topic of digital anthropology and how we can rehumanize cybersecurity. The post Rehumanizing Cybersecurity with Lianne Potter appeared first on The Shared Security Show.
"We want to understand that average person, and the average InfoSec professional and what they are experiencing," says Gretel Egan Sr. SecurityAwareness Training Strategist at Proofpoint. SecurityAwareness Finding #1: training programs need improving. SecurityAwareness Finding #2: what phishing attacks lead to.
SAN ANTONIO–( BUSINESS WIRE )–SecurityAwareness Training and Human Risk Management company AwareGO today announced company milestones achieved and overall performance for 2021, including record year-over-year online revenue growth of 219%, enterprise revenue growth of 156%, and total revenue growth of 116%. About AwareGO.
Building a securityawareness training program to develop a strong infosec culture requires time and money, and chief information security officers frequently try to make a case for such an investment by citing return on investment and other metrics of success. .” Christiaan Colen / CC BY-SA 2.0 ).
On this episode, Tom Eston discusses empathy in cybersecurity with Andra Zaharia, host of the Cyber Empathy Podcast. We talk about finding her passion for contributing to the industry and the importance of empathy in cybersecurity.
The post CISO Stories Podcast: No Insider Cybersecurity Risk? appeared first on Security Boulevard. What happens when an employee decides to leave the organization and start their own business – but with your Intellectual property or customer lists? . Guess Again!
enroll in credit monitoring, credit freeze, use 2FA, change passwords), infosec people typically have different questions. The post If You Don’t Need Data, Don’t Keep It appeared first on Security Boulevard. While many articles have focused on what consumers should do if they were a victim of the breach (e.g.,
Hackers are routinely attempting novel ways to infiltrate corporate networks so it’s important to ensure that your employees are aware of how their online behavior can make them – and you – more vulnerable. Build securityawareness training modules to educate your employees on how to spot phishing emails or business-related scams.
House Oversight and Homeland Security committees last week, SolarWinds’s former and current CEOs blamed an intern for creating a weak FTP server password and leaking it on GitHub – an act which may or may not have contributed to a supply chain hack that impacted users of the tech firm’s Orion IT performance monitoring platform.
Each year, a select pool of experts from the cybersecurity community sets hours aside to review hundreds of entries received for the SC Trust and Excellence Awards. Dan Basile is the chief information security officer for the RELLIS campus at the Texas A&M University System and director of Statewide Cybersecurity Services.
The ‘Aware Much’ segment focuses on […] The post Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits appeared first on Shared Security Podcast. The post Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits appeared first on Security Boulevard.
Welcome to the Ask Chloé column on Security Boulevard! This week, Chloé offers advice to an InfoSec pro struggling with response time anxiety. The post Ask Chloé: Response Time Etiquette appeared first on Security Boulevard. Dear Chloé, Do you ever get nervous when someone doesn’t text/Slack/email you back within a day?
An aware employee is less likely to fall for a phishing scam. Conducting cybersecurityawareness training (including around phishing ) may be compulsory to comply with your industry’s standards and regulations. Apart from that, you can test your employees using a simulated phishing awareness campaign.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Dmitriy Sokolovskiy has been working in the cybersecurity space for over 14 years in dedicated security roles, in addition to 9 more years working in various IT areas.
This week, Chloé offers advice on getting a talk accepted at an InfoSec conference. Dear Chloé, I’ve been trying to get my talk accepted at InfoSec conferences; however, I keep. The post Ask Chloé: How to Get Your Talk Accepted appeared first on Security Boulevard.
In the first installment of our cybersecurity best practices, we explored how individuals can safeguard their personal data. But just as vital to security is employee securityawareness and protecting important information within an organization.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Andrea Szeiler has been working in the cybersecurity space for over a decade. She held Audit and Security leadership roles in leading European companies.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Piotr Stecz has been working in Adamed Pharma for 18 years in various IT and Security roles. What is the biggest challenge security […].
SC Media talked about the event’s significance and its transition to a virtual setup with organizer Bryson Bort, who is also founder of Scythe, a start-up building a next generation attack emulation platform, and GRIMM, a boutique cybersecurity consultancy. Are there particular lessons you hope infosec people will come away with?
After all, it creates a culture of security-minded teams and incentivizes ongoing excellence for software that everyday users rely upon. The latest approach within secure coding training now links real-time vulnerability detection with training curriculum—allowing infosec teams.
This is bewildering, scary stuff, especially for relatively inexperienced infosec or cybersecurity professionals who seldom set foot outside of the IT domain. At the CISO, Information Security Manager or Privacy Officer level, the view is no less scary despite narrower knowledge gaps. All requirements?! Documented! Maintained!
Curated advice, guidance, learning and trends in cybersecurity and privacy, as chosen by our consultants. First published in the Journal of Cybersecurity , the research aims to understand the ‘privacy paradox’, where people share information without protecting it from others who don’t need to see it.
A few years ago I came up with an approach that looks like this: More recently, I learned of the OWASP Cyber Defense Matrix , which takes a similar approach to mine above, but mixing it with the NIST Cybersecurity Framework. Instead, be aware that your basics come first (out of necessity), then comes some form of risk mgmt.,
All organizations must have securityawareness training programs to teach basics to end users. The post CISO Stories Podcast: Fiscally Responsible Ways to Train and Build Community appeared first on Security Boulevard. Similarly, the technical teams need to be exposed to flexible training that is interesting to them.
In this episode, Tom shows off AI generated images of a “Lonely and Sad SecurityAwareness Manager in a Dog Pound” and the humorous outcomes. The conversation shifts to Apple’s upcoming support for Rich Communication Services (RCS) and the potential security implications.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content