Remove Architecture Remove CISO Remove Phishing Remove Security Awareness
article thumbnail

Strong medical device security awareness stifled by inventory, knowledge gaps

SC Magazine

This creates a major gap in security awareness, considering the 65,000 ransomware attacks deployed in the U.S. They have information about a ‘point in time,’ however most would not be aware of a vulnerability and thus a patch, until after a vulnerability scan is complete.”. “In

article thumbnail

Nurturing Our Cyber Talent

IT Security Guru

The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry.

CISO 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inflation Is Making Cybersecurity Even More Challenging for Leaders

SecureWorld News

Additionally, cybercriminals may be able to use inflation to their advantage, such as by sending phishing emails that appear to be from legitimate companies offering discounts or assistance. I think it requires taking a step back and assessing what you can do with less," said Chris Roberts, CISO and Senior Director at Boom Supersonic.

article thumbnail

How to build a zero trust ecosystem

SC Magazine

With its tailored controls, micro-perimeters and trust-nothing approach to access, Zero Trust gives CISOs confidence that their security program can secure their remote workforce and meet regulatory compliance requirements. Thanks to a rapid shift to remote work, Zero Trust is finally garnering the attention it deserves.

CISO 134
article thumbnail

Cybersecurity Culture: How Princeton University's Security Team Created It

SecureWorld News

Sherry brought to Princeton his 25 years of technology experience, 12 of which was in higher education as the former CISO at Brown University. In many ways, leading a security mission out of a university is like securing a city. Security culture: the security team and everyone else.

article thumbnail

The Quest for Optimal Security

The Falcon's View

However, listing out specific technologies can become cumbersome, plus it doesn't necessarily lend itself well to thinking about security architecture and strategy. However, what this means within the context of optimal security can vary substantially, not the least being due to staffing challenges. Applications. -

InfoSec 40
article thumbnail

ROUNDTABLE: Kaseya hack exacerbates worrisome supply-chain, ransomware exposures

The Last Watchdog

Here’s what they had to say, edited for clarity and length: Vikram Asnani, senior director – solution architecture, CyberGRX. Chris Clements, VP of solutions architecture, Cerberus Sentinel. Gary Phipps, VP of solution architecture, CyberGRX. James McQuiggan, security awareness advocate, KnowBe4.