article thumbnail

Nurturing Our Cyber Talent

IT Security Guru

The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry. We must reduce barriers to entry.

CISO 117
article thumbnail

Could this 'Unhackable' Chip Be a Security Moonshot?

SecureWorld News

And the developers say this chip could end the "patch and pray" strategy that keeps security teams running in circles and lower the stress level of CISOs in the process. Undefined semantics are nooks and crannies of the computing architecture—for example the location, format, and content of program code.

CISO 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

In 1988 we had the Morris Worm , if you remember from the history books. That includes the architectures, the computing platforms, the algorithms and the people and the process as well. The post New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’ appeared first on SC Media.

CISO 109
article thumbnail

Clarity and Transparency: How to Build Trust for Zero Trust

Cisco Security

It’s the first of the Four Agreements – a set of universal life principles outlined in the bestselling book by Don Miguel Ruiz. Next Steps Listen to the conversation Wolfgang Goerlich, Advisory CISO, and I had during this on-demand webinar entitled “The Skeptic and the Data: How to Build Trust for Zero Trust”.

Marketing 127
article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

AI and automation will play a vital role in managing the complexity of zero trust architectures, enabling real-time incident response through AI-powered analytics and machine learning. It emphasises the need for CISOs to provide comprehensive and accurate reports, ensuring that no important details are overlooked.

article thumbnail

What is in Your SOC?

Security Boulevard

Except for a few “off-the-books” emergency budget requests to cover things cybersecurity insurance claims the provider did not pay, the CISO and CIO pretty much know how many “swords” they have to work with to support 24x7x365 security monitoring and operations. SOAR automation expertise supporting an adaptive security architecture.

Risk 98
article thumbnail

As Internet-Connected Medical Devices Multiply, So Do Challenges

Cisco Security

He shared an anecdote in Cisco Secure’s recent e-book, “ Building Security Resilience ,” about finding malware on an intensive care unit device that compromised a pump used to deliver precise doses of medicine. That doesn’t mean the risk is zero, noted Christos Sarris , a longtime information security analyst.

Internet 117