Remove 2008 Remove Cyber threats Remove Technology
article thumbnail

Shifting from Business Continuity to Continuous Business in Cyber

Jane Frankland

Just think about what happened at the last financial crisis in 2008, or more recently with the COVID 19 pandemic. It means ensuring that you’re future ready and better equipped than your competitors to meet the demands of new technologies and threats.

article thumbnail

Unmasking the Cracks of Today’s Cyber Defence

Jane Frankland

C-suites across all industries, from traditional finance to the latest “unicorns” emerging in the fintech industry, are facing a formidable challenge: how to protect their business and customer data against growing cyber threats. As a CISO or ITDM, the cyber defence challenges you face in your business couldn’t be tougher.

CISO 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DHS offers program to recruit and retain talent in Cybersecurity

CyberSecurity Insiders

Department of Homeland Security, shortly known as DHS, has launched a Cyber Talent Management System (CTMS) that offers a scope to recruit and retail cybersecurity talent. As Information Technology usage is growing, the same old traditional hiring techniques won’t work while hiring for critical vacancies.

article thumbnail

Mandating End-to-End Verifiable Voting Systems in U.S. Elections

SecureWorld News

presidential election, the 2016 election interference, and ongoing concerns about cyber threats have highlighted the critical need for election security measures. Even with VVPAT, the auditing process can be insufficient to detect all discrepancies, particularly in close races (Stark, 2008). The 2020 U.S.

article thumbnail

ThreatDown powered by Malwarebytes: A 15 Year Journey

Malwarebytes

Building off Malwarebytes’ initial recognition for removing every trace of viruses that others missed, ThreatDown powered by Malwarebytes combines award-winning technologies that cover all stages of an attack, with managed services for teams with limited resources. To say it’s been quite a journey to this point would be an understatement.

article thumbnail

Indicators of compromise (IOCs): how we collect and use them

SecureList

What is cyber threat intelligence, and how do we use it in GReAT? This is what we call cyber threat intelligence. It is a highly demanding activity, which requires time, multidisciplinary skills, efficient technology, innovation and dedication. But why are we offering cyber threat intelligence at all?

article thumbnail

2024 Paris Olympics Present Podium-Worthy Cybersecurity Challenges

SecureWorld News

The Olympics are a prime target for cyberattacks due to their high profile, the involvement of numerous stakeholders, and the extensive use of digital technologies. Diverse technologies: The integration of various technologies, from traditional IT systems to newer IoT devices, increases the complexity of securing the event.