This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The cybersecurity landscape has never moved faster and the people tasked with defending it have never felt more exposed. This is the backdrop for The CISO on the Razors Edge , a new book by Steve Tout , longtime identity strategist and advisor to Fortune 500 security leaders. Its not a people problem.
For nearly a decade, we’ve heard the same discussion in cybersecurity circles about the gender diversity problem. Yet here we are, in 2025, and the percentage of women in cybersecurity remains stagnantor worse, is backtracking. Meanwhile, cybersecurity job vacancies are skyrocketing. It’s utter madness.
Veteran cybersecurity expert witness executive will help strengthen law enforcement capabilities to prevent, investigate, and prosecute information-age crimes. Analysts have calculated that he is among the top three cybersecurity influencers worldwide. patent filings.
Steinberg was selected for the forum based on his proven expertise in the fields of cybersecurity, privacy, and artificial intelligence. Steinberg brings important insights about cybersecurity, privacy, and artificial intelligence to this community.”. He amassed millions of readers as a regular columnist for Forbes and Inc.
Cybersecurity governance has undergone a dramatic transformation over the past few decades. We have moved beyond traditional compliance-driven security models to risk-based approaches, integrating cybersecurity into enterprise risk management (ERM) frameworks. But the question remains: where are we headed?
Today, however, after, having had literally hundreds of conversations with, and about, Israeli cybersecurity companies, I thought that I would mention to my readers a few of the firms that I find interesting. The firm has also expanded into cybersecurity systems for aircraft. Axis Security.
3, 2025, CyberNewswire– Arsen , the cybersecurity startup known for defending organizations against social engineering threats, has announced the release of its new Vishing Simulation module, a cutting-edge tool designed to train employees against one of the fastest-growing attack vectors: voice phishing (vishing). Paris, Jun.
In 2021, Newsweek invited Steinberg to join its community of pioneering thinkers and industry leaders, and to provide the news outlet with input related to his various areas of expertise, including cybersecurity, privacy, and artificial intelligence. He amassed millions of readers as a regular columnist for Forbes and Inc.
In 2021, based on Steinberg’s proven expertise in the fields of cybersecurity, privacy, and artificial intelligence, the premier news outlet invited him to join its community of pioneering thinkers and industry leaders, and to provide input related to his areas of expertise.
The world of cybersecurity is booming, with digital threats increasing and businesses needing to protect their data. But can cybersecurity make you a millionaire ? As the demand for cybersecurity professionals continues to rise, so do the financial opportunities for those who excel in this domain.
Cybersecurity training has steadily gained traction in corporate settings over the past decade, and rightfully so. Cybersecurity education for kids is therefore a smart investment. We know that we will need many more experts in cybersecurity than we are currently grooming. Do you have a corporate book club?
I’m delighted to announce the latest member of our growing CISO Advisor team, Pam Lindemeon. Pam is an exceptional leader; dedicated to advancing women in the IT industry, and I’m so glad she’s now joined Cisco to work closely with our community of CISOs and offer advice and guidance based on her incredible experience. Pam Lindemeon.
“The Hitchhiker’s Guide to the Galaxy,” by Douglas Adams, could actually be a guide to cybersecurity if read in a different context. The crux of the problem in present-day cybersecurity practice is summed up in this exchange from the book: After seven and a half million years of computing, “The answer to the Great Question of.
In the cybersecurity industry and across the broader workforce, the question is no longer if AI will impact jobs, but which ones, how quickly, and what comes next. That doesn't mean the human cybersecurity workforce is obsolete. Bottom line: AI is changing the nature of cybersecurity work, but not eliminating it wholesale.
Here are some tips to excite kids about cybersecurity. In my latest book, The Super Smart Cyber Guide for Kids , I combine educational narrative, conversation starters and fun activities to inspire children, while offering a guided teaching tool to adults. Discuss digital personas. About the essayist.
In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. Michael Gregg is the CISO for the State of North Dakota. He was voted one of the top 100 CISOs for 2023, has been invited to the White House, has testified before the U.S.
The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry.
Touhill brings a rich and diverse background to the role, having spent years protecting military computer networks as an Air Force brigadier general and later serving as director of the National Cybersecurity and Communications Integrations Center at the Department of Homeland Security. I lived it. I’m absolutely thrilled.
This is how to redefine CISO events! I had a spectacular time at the “Locked In — The Cybersecurity Event of the Year!” Forget long boring sessions and tracks, this was about CISOs connecting at a social level, building relationships, and sharing insights. Organized by Rinki Sethi and Lucas Moody, it was nothing short of epic!
Related: Preparing for ‘quantum’ hacks That being so, a new book, Fixing American Cybersecurity , could be a long overdue stake in the ground. Laid out in two parts, Fixing American Cybersecurity dissects the drivers that got us here and spells out explicitly what’s at stake.
Too many people are unsure how to enter or grow in the cybersecurity industry. Hiring managers who are worried about finding candidates because of the much-discussed cybersecurity skills gap should consider the underlying issue, which I'd like to call the cybersecurity careers gap. Explain what a cybersecurity career entails.
This is bad news for everyone, but it may turn out to be especially hard on women in cybersecurity. I wrote about this in Chapter 2 of my book IN Security (shameless plug – it’s available on Amazon ). The skills gap in cybersecurity is already widening and layoffs will make it worse. Here’s why: #1.
In an article by mathematician Hannah Fry in the March 29, 2021 edition of The New Yorker, she reviews two new books on data and statistics. The post Don’t Count on Cybersecurity Data appeared first on Security Boulevard. We collect and disseminate all manner of data, but not so much of data which count.
Before you do either of those things—again—consider this: a new computer chip remains unhacked after DARPA and more than 500 cybersecurity researchers tried to break through its security. Pete Chronis, former CISO at Warner Media (HBO, Turner Broadcasting, etc.), was discussing his recent book about fixing cybersecurity.
Is it really something worth celebrating in cybersecurity? In other reports, for example Cybersecurity Ventures , women consistuted 20% in 2019 and 25% in 2021, and the UK’s Department of Culture and Media Studies (DCMS), found that the proportion of women in the workforce has increased from 16% in 2021 to 22% in 2022.
While serving with the think tank, Steinberg will continue in his full-time role as an independent cybersecurity expert witness and advisor, and as the author of one of the most-read columns in the cybersecurity field. About GFCyber. He amassed millions of readers as a regular columnist for Forbes and Inc.
A new book exposes yet another Facebook failure for the social media firm to say sorry about. But nothing’s going to change. The post Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data appeared first on Security Boulevard.
Since 2011, I’ve consistently spoken, and written about the dangers of burnout in cybersecurity, and proposed leadership strategies for employee wellbeing. According to IBM , mistakes in cybersecurity are still so overwhelming that 95% (19 in 20) result from human error, and the global average total cost of a data breach is $4.35M.
The Security Gap JPMorgan Chases CISO Didnt MentionAnd Why Its in YourBrowser When the CISO of JPMorgan Chase issues a public letter to all technology vendors, the industry pays attentionand rightfully so. In other words, everything the CISOs letter warns about is already playing out inside thebrowser. Lets fixthat.
By Sebastian Goodwin, CISO, Nutanix IT budgets and revenue growth areas are top of mind at the beginning of every calendar year, even more so with the current state of the world economy. IT departments and data teams are looking at the best ways to prioritize, maintain and build security measures – while being cost effective.
ISC)2’s research in 2021, ’In Their Own Words: Women and People of Color Detail Experiences Working in Cybersecurity, ’ highlights the division women and people of colour in cyber face, and I encourage you to read it if you’ve not done so already. It’s helping me massively. Or, you can speed the process up and work with me.
Simply taking a pause from email and social media in favor of a good book or conversation is known to increase your mood and life satisfaction. While unplugging isn’t an option for business, the notion of stepping back to give your business the time to evaluate cybersecurity preparedness can be highly beneficial.
A conversation with Jason Witty, head of cybersecurity and technology controls, and global chief information security officer for JPMorgan Chase. One of a series of security leadership profiles prepared by Cybersecurity Collaborative in conjunction with SC Media. On adaptability, we all know that we are never “done” in cybersecurity.
Mauro Israel is an avid poker player, having studied the game since he was a teenager and written several books on the topic. The same is true in cybersecurity, a field that is constantly evolving, especially in the wake of COVID-19. Listen to episode 8 of CISO Stories, Going All-in on a Career in Security. ”).
Category Cybersecurity Fundamentals Risk Level. Recently, however, this has evolved to add a new responsibility: collaboration with the Chief Information Officer (CIO) and the Chief Information Security Officer (CISO). Says every CFO to their team as they work to apply their expertise to measure its cybersecurity risk.
Nowadays, organisations need digital leaders such as CIOs, CISOs, and CTOs who are strategists, visionaries, and know how to manage, effectively. trillion cumulative GDP growth.The skills gap is slowing digital transformation and in cybersecurity it’s increasing risks. When they anticipate the next steps, and act upon them.
In an article for CISO Compass, CEO and CISO, Lee Parrish, deftly uses a colonoscopy metaphor to illustrate the difference between security and compliance. This isn’t his first foray into thinking outside the box to explain cybersecurity. Listen to episode 9 of CISO Stories, The Colonoscopy of CyberSecurity.
With Black Hat USA 2021 just around the corner, I had a deep discussion about this with Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security. We discussed why graph databases and graph analytics are so well-suited to advancing cybersecurity – especially as digital transformation accelerates towards, and within, the cloud.
In 2022, we unveiled a vision of how proactive cybersecurity processes needed to evolve. Source: Tenable, May 2025 Source: Tenable, May 2025 Whether youre reporting to your CISO or digging deep into root causes, Tenable One Dashboards bring clarity and focus to your risk management efforts.
It’s the first of the Four Agreements – a set of universal life principles outlined in the bestselling book by Don Miguel Ruiz. After all, cybersecurity is too important to be cavalier about what is possible – within a particular use case, product, or service. Be impeccable with your words. Words can connect us, as well as divide us.
Troia recently published a book called Hunting Cybercriminals, A Hacker's Guide to Online Intelligence Gathering Tools and Techniques. The book reveals secrets of The Dark Overlord and other hacking groups which Troia communicated with through various dark web aliases. Hackers create a worm named after cybersecurity company.
The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs. R – Resilience, risk management, and regulatory compliance Cyber resilience is mission critical and enhances business value, as even the best cybersecurity cannot guarantee 100% protection.
Organizations developing a Security operations center(SOC) should consider which strategy they should adopt based on available cybersecurity professional resources: offensive or defensive? Are they experienced cyber warriors or recent additions to the cybersecurity field or resources moving over from traditional IT roles?
Aissi will lead cybersecurity for Blackhawk, including security strategy, engineering, infrastructure and governance, business continuity and third-party risk management. Aissi has received industry accolades for security innovation and leadership, including the 2019 and 2021 CISO of the Year Award and 2021’s Top 100 Global CISOs.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content