article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

We need policymakers who understand technology, but we also need cybersecurity technologists who understand -- ­and are involved in -- ­policy. When you broaden the definition of Internet security, many additional areas fall within the intersection of cybersecurity and policy. We need public-interest technologists.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

We need policymakers who understand technology, but we also need cybersecurity technologists who understand­ -- and are involved in -- ­policy. When you broaden the definition of Internet security, many additional areas fall within the intersection of cybersecurity and policy. We need public-interest technologists.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Purdue University’s CERIAS 2021 Security Symposium – Nasir Memon’s ‘AI, Computational Imaging And The Battle for Media Integrity’

Security Boulevard

Our thanks to Purdue University’s The Center for Education and Research in Information Assurance and Security (CERIAS) for publishing their illuminating security symposiums, seminars, talks, and presentations on the Schools’ YouTube channel.

Media 57
article thumbnail

The Evolving Role of Cyber Insurance in Mitigating Ransomware Attacks

SecureWorld News

Insurance companies are now offering policies that integrate risk assessments, provide guidance on security best practices, and even offer premium discounts for businesses that implement robust cybersecurity measures in their operations.

article thumbnail

CISSPs from Around The Globe: An Interview with Theresa Grafenstine

CyberSecurity Insiders

She shares with us her passion for cybersecurity and her advice for those considering it as a career. I also oversee audits in cybersecurity, business continuity, crisis management, and resilience. Did you start your career in cybersecurity or was it some other route that brought you to cybersecurity?