Remove 2008 Remove CISO Remove Technology
article thumbnail

The Dangers of AI Acceleration: Why a Deregulatory Stance Threatens Humanity

Jane Frankland

For business leaders, particularly those in tech, understanding the implications of such policies is criticalnot just for protecting their organisations, but for contributing to a future where technology is wielded ethically and responsibly. When technological advancements go unchecked, they can have serious consequences.

Risk 130
article thumbnail

Shifting from Business Continuity to Continuous Business in Cyber

Jane Frankland

As ITDMs, CISOs and cyber risk owners this is our dream scenario, and he got me thinking. It’s a subtle shift in focus, and requires a fundamental change in how we, as ITDMs, CISOs and cyber risk owners view and action resilience—not as a one-time project, but as an ongoing programme that provides strategic advantage.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why do CISOs Keep Quitting on Florida?

SecureWorld News

Chief Information Security Officers (CISO) have the luxury of being an incredibly hot commodity, so they can pretty much pick and choose where they work, as they are almost guaranteed to have a job waiting for them somewhere. Cybersecurity officials struggle in Florida. DeSantis appointed former state Rep. And this is increasing cyber risk.

CISO 98
article thumbnail

Unmasking the Cracks of Today’s Cyber Defence

Jane Frankland

However, new research from e2e-assure has revealed that few organisations are taking full advantage of security technologies available today. Having surveyed over 500 CISOs and ITDMs responsible for cybersecurity on the challenges faced with SOCs, their insights are not to be missed. That is if your provider is performing.

CISO 147
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black. Also read : Addressing Remote Desktop Attacks and Security.

article thumbnail

Using Cloud Securely?—?The Config Doom Question

Anton on Security

Technology underlying modern hyperscale cloud environments changes rapidly, but security misconfigurations became the key cloud security problem at least 10 years ago, and possibly 15–17 (!) years ago, and stayed “top of the charts” for all this time (public cloud computing was born, depending on who you ask, in 2006–2008).

article thumbnail

Dancho Danchev’s Testimony on “How Facebook Today’s Meta Failed To Protect Its Users and React To The Koobface Botnet And What We Should Do About It?”

Security Boulevard

Acknowledgement from someone in the field for my Koobface Gang research from 2008 to 2013. In a world where everything is interconnected, we rely on technology to communicate, work, and thrive. It is not enough to rely solely on technology to protect us. What do you want? How can we assist? We must be proactive in our approach.