Remove Architecture Remove CISO Remove Media Remove Network Security
article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

Touhill brings a rich and diverse background to the role, having spent years protecting military computer networks as an Air Force brigadier general and later serving as director of the National Cybersecurity and Communications Integrations Center at the Department of Homeland Security. chief information security officer.

CISO 109
article thumbnail

Firms with exposed IoT have a higher concentration of other security problems

SC Magazine

For example, companies with exposed IoT are more than 50% more likely to have email security issues, according to a new report and blog post from the Cyentia Institute and RiskRecon. But what does that correlation mean for chief information security officers? SC Media spoket o Kelly White, RiskRecon founder and CEO, to find out.

IoT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Could this 'Unhackable' Chip Be a Security Moonshot?

SecureWorld News

Before you do either of those things—again—consider this: a new computer chip remains unhacked after DARPA and more than 500 cybersecurity researchers tried to break through its security. The name might have tipped you off to a key feature; it morphs before attackers can figure out how to crack the chip's security.

CISO 125
article thumbnail

A roadmap for developing a secure enterprise cloud operating model

SC Magazine

Design core cloud security patterns that comply with the policy and standards. Design core cloud security to detect violations of fundamental security design principles. Implement reference architectures based on the security patterns. Make the patterns available to the business and technology teams.

article thumbnail

Here’s how security pros can lock down their remote networks

SC Magazine

Before executing a security strategy, it’s important to have a complete account and inventory of all device types and assets, as well as an accurate blueprint of the organization’s network infrastructure. For example, some devices may not support the deployment of security clients, so securing them becomes a matter of network policies.

IoT 59
article thumbnail

Verdict is in: Forward-thinking security controls prepared Jersey Courts for COVID

SC Magazine

For many companies, “if security was done during the pandemic, it was probably too late,” explained McCarthy’s colleague Sajed Naseem, CISO of New Jersey Courts. The post Verdict is in: Forward-thinking security controls prepared Jersey Courts for COVID appeared first on SC Media.

VPN 52
article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. Disinformation is going to be incredibly effective now that social networks have scaled back or completely removed their moderation and verification efforts.