Remove CSO Remove Cyber Risk Remove Encryption
article thumbnail

Cybersecurity’s Comfort Zone Problem: Are you Guilty of it?

Jane Frankland

Tools like Generative AI, advanced encryption systems, quantum computing, and automated threat detection are thrilling to evaluate, offering dashboards full of data and the tantalising promise of cutting-edge solutions. The hard truth is that technology alone cant fix the root causes of cyber risk.

Risk 100
article thumbnail

Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture

Security Boulevard

Here’s why ” (SC World) “ Quantum and the Threat to Encryption ” (SecurityWeek) 2 - How to establish a great cybersecurity culture in your org Corporate culture can have a major impact on the success or failure of a company’s cybersecurity efforts.

CISO 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: CISA’s Best Cyber Advice on Securing Cloud, OT, Apps and More

Security Boulevard

For more information about the threat from nation-state cyber attackers: What CISOs Need to Know About Nation-State Actors (InformationWeek) 4 Ways to Defend Against Nation-State Attacks (BankInfoSecurity) Growing Nation-State Alliances Increase U.S. Tenable was one of the 68 original signatories of the pledge.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

It is vital for any enterprise landscape to ensure viable, open, and reliable corporate communications – fostering innovation and economic prosperity, with respect to safeguarding against disruption and serious cyber risk perception. What are the benefits of cyber security awareness trainings?

article thumbnail

The Nature of Cybersecurity Defense: Pentagon To Reveal Updated Zero-Trust Cybersecurity Strategy & Guidelines

CyberSecurity Insiders

In order to achieve Zero Trust, application security and API security can’t be left out of the equation; shares Richard Bird, CSO, of Traceable AI. Justin McCarthy, Co-Founder and CTO of Strong DM agrees that developing Zero Trust strategies is an essential step towards mitigating cyber risk.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyber risk owners better prepare for the evolving landscape. Ransomware remains a prominent threat, but the methods have evolved.