Remove CISO Remove Technology Remove Telecommunications
article thumbnail

Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture

Security Boulevard

And get the latest on exposure response strategies and on CISO compensation and job satisfaction. National Institute of Standards and Technology (NIST) released three quantum-resistant algorithm standards in 2024 and expects to release a fourth in 2026. Plus, find out how your company can create a better cybersecurity environment.

CISO 52
article thumbnail

Scattered Spider Strikes Again: U.K. Attacks Spark U.S. Retailer Alarm

SecureWorld News

Google's report confirms that UNC3944 continues to "demonstrate persistence and adaptability in targeting organizations, particularly those in the retail, hospitality, and telecommunications sectors." Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE).

Retail 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Preparing for the dire cybersecurity consequences of Russia’s invasion of Ukraine

The Last Watchdog

The Russian government, military, and intelligence service may wish to achieve some operational effect, for example, disrupting the power grid or interfering with telecommunications infrastructure, which may be part of a larger war plan. which supplies ultra-sensitive, portable marijuana breathalyzer technology.

article thumbnail

Canada Releases 2025 National Cyber Security Strategy

SecureWorld News

Technology is an integral part of our lives that has become increasingly linked to critical infrastructure and the services we rely on daily like our hospitals, transit systems, energy suppliers, and telecommunications systems," said a press release from Public Safety Canada.

article thumbnail

Could this 'Unhackable' Chip Be a Security Moonshot?

SecureWorld News

And the developers say this chip could end the "patch and pray" strategy that keeps security teams running in circles and lower the stress level of CISOs in the process. Talk of an unhackable technology reminds me of a fireside chat I saw at a SecureWorld conference a few years ago. Could MORPHEUS chip be a security moonshot?

CISO 130
article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

5G technology will improve some IoT use cases, thereby adding to the proliferation of IoT devices – a phenomena individuals and organizations aren’t prepared to fully defend in the immediate future. Untrusted proprietary technologies that fail to meet these standards pose lingering threats to their clients and inefficiencies.

Risk 137
article thumbnail

Spotlight on Cybersecurity Leaders: Dr. Fred Kwong

SecureWorld News

Dr. Fred Kwong is VP and CISO at DeVry University and is based in Chicago, IL. He has been in the information security and technology field for the past 20 years working in education, financial, telecommunication, healthcare, and insurance sectors. A : The ever-changing technology and threats that come along with it.