article thumbnail

What actually drives information security?

Notice Bored

The 'obvious' driver for information security is information risk: valuable yet vulnerable information must be secured/protected against anything that might compromise its confidentiality, integrity or availability, right? What does management want/expect out of information security?

article thumbnail

Author Q&A: In modern cyberwarfare ‘information security’ is one in the same with ‘national security’

The Last Watchdog

Now comes a book by John Arquilla, titled Bitskrieg: The New Challenge of Cyberwarfare , that lays out who’s doing what, and why, in terms of malicious use of digital resources connected over the Internet. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Introducing meaningful AI features for information security in 2024

IT Security Guru

Nick Graham, Chief Technology Officer at information security software business Hicomply discusses the recent surge in interest around artificial intelligence. For more information or to book a demonstration, visit www.hicomply.com.

article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

We have so much change happening and we can drive it to happen in a more positive way to reduce the resource needs for organizations and actually scale security for businesses of all sizes.".

InfoSec 72
article thumbnail

As Internet-Connected Medical Devices Multiply, So Do Challenges

Cisco Security

To consumers, the Internet of Things might bring to mind a smart fridge that lets you know when to buy more eggs, or the ability to control your home’s lighting and temperature remotely through your phone. But for cybersecurity professionals, internet-connected medical devices are more likely to be top-of-mind.

Internet 117
article thumbnail

GUEST ESSAY: Now more than ever, companies need to proactively promote family Online Safety

The Last Watchdog

Consider that kids are constantly connected on the internet with online games, streaming devices, virtual schooling, and zoom play dates. Do you have a corporate book club? I’ve also been brought in to host Virtual Reading Events with the book for corporate programs. We’re all connected. Send gifts to clients?

Education 203
article thumbnail

Hackers exploit 3-years old flaw to wipe Western Digital devices

Security Affairs

Threat actors are wiping many Western Digital (WD) My Book Live and My Book Live Duo NAS devices likely exploiting an old vulnerability. Owners of Western Digital (WD) claim that their My Book Live and My Book Live Duo network-attached storage (NAS) devices have been wiped. Pierluigi Paganini.