Remove CISO Remove Media Remove Network Security Remove Technology
article thumbnail

Managing the great return: What CISOs should consider when reopening the office

SC Magazine

Ideally, “organizations had crisis management programs activated a year ago,” said Andrew Turner, senior vice president in Booz Allen’s cybersecurity services, bringing together human resources, security teams, technology, and executive management. A second, more nuanced problem relates to technology.

CISO 121
article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

Touhill brings a rich and diverse background to the role, having spent years protecting military computer networks as an Air Force brigadier general and later serving as director of the National Cybersecurity and Communications Integrations Center at the Department of Homeland Security. chief information security officer.

CISO 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Nemertes Study Reveals Benefits of Zero Trust Extend Far Beyond Network Security

CyberSecurity Insiders

NEW YORK–( BUSINESS WIRE )– Nemertes , a global research-based advisory and consulting firm that analyzes the business value of emerging technologies, announces the release of a Real Economic Value study on Appgate SDP , an industry-leading Zero Trust Network Access (ZTNA) solution. A complimentary copy is available here.

article thumbnail

US urges mayors to confer with states on cyber posture, but can more be done?

SC Magazine

Deputy National Security Advisor for Cyber and Emerging Technology Anne Neuberger speaks at a White House press briefing last February. ” Gary Hayslip, current CISO at SoftBank Investment Advisers and a former CISO of San Diego, also said he “didn’t see anything new” that would catch U.S.

CISO 80
article thumbnail

Five Tips for Ensuring Communications Security in Your Organization

CyberSecurity Insiders

Communications security is a set of integrated policies, procedures, and technologies used to protect sensitive information. In a more general sense, communications security is the prevention of unauthorized access to communication’s traffic. Additionally, only approved social media platforms should be accessible.

article thumbnail

Could this 'Unhackable' Chip Be a Security Moonshot?

SecureWorld News

Before you do either of those things—again—consider this: a new computer chip remains unhacked after DARPA and more than 500 cybersecurity researchers tried to break through its security. The name might have tipped you off to a key feature; it morphs before attackers can figure out how to crack the chip's security.

CISO 125
article thumbnail

Security gaps in operational tech exposed with hacker attempt to poison Florida city water

SC Magazine

Geyer attributes the growing number of bugs to “the long depreciation period of equipment in critical infrastructure environments” as well as “technology obsolescence.” Moreover, “many water utilities are small entities and are under-resourced, making the challenge of developing a robust security program that much more challenging.”. “In

CISO 144