This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Sharing intelligence for the greater good is an essential component of making Internet-centric commerce as safe and as private as it needs to be. Started by infosec professionals, Peerlyst takes the characteristics of B2B communications we’ve become accustomed to on Twitter and LinkedIn and directs it toward cybersecurity.
In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyberrisk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »
Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. I recommend the TTX exercise or 'game' be created using the Center for Internet Security v8 control objectives and free templates.
Just like any internet-connected device that handles important data, orbital satellites are potential targets for hackers. Ground stations, increasingly cloud-based to improve flexibility and scaling, expose critical command and telemetry systems to the same cyberrisks that plague data centers on Earth.
Tomislav tells us why issues related to Log4j won’t be going away anytime soon and how organizations must adapt to deal with the risk it poses. Episode 218: Denial of Sustenance Attacks -The CyberRisk To Agriculture. In the meantime, threat actors are scanning the Internet to identify servers vulnerable to exploitation.
While layoffs appear imminent, she discussed how cybersecurity professionals will be affected by the slowing economy. She also spoke to the broader consequences of staff shortages and how this may affect the global cybersecurity workforce gap.
With technological innovations like cloud computing, AI/ML, the Internet of Things, and more making cyberrisks even more complex, qualified talent is hugely in demand. Cybersecurity is one of the fastest-growing professions, with demand far outpacing supply even in normal economic conditions.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyberrisks to OT environments. Read the whole entry. »
In this Spotlight Edition of the podcast we're speaking with RSA Chief Technology Officer Zulfikar Ramzan about how his company is adapting to help its customers confront the dark side of digital transformation initiatives: increased digital risk, including from cloud, artificial intelligence and the Internet of Things.
Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Leighton is also a founding partner of CYFORIX, specializing in the field of cyberrisk. He was also director of the SANS Internet Storm Center. Louis, and chief operating officer and CTO with Upic Solutions.
In today’s digital age, cyber-related threats represent one of the most significant risks to organizations, necessitating a robust integrated risk management system that prioritizes cybersecurity. However, these advancements also introduce new digital risks, such as cyber threats, data breaches, and privacy concerns.
» Related Stories Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Episode 159: Deep Fakes and Election (in)Security with ZeroFOX Spotlight Podcast: Rethinking Your Third Party CyberRisk Strategy. If you believe the headlines, the first known disruptive cyber attack against the U.S.
Related Stories Episode 162: Have We missed Electric Grid Cyber Attacks for Years? Also: Breaking Bad Security Habits Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Spotlight Podcast: Rethinking Your Third Party CyberRisk Strategy. This was all pretty straight forward.
Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. Real-world conflicts cast shadows that significantly amplify cyberrisks.
Operating with a team of individuals who are cybersecurity savvy is one of the best tools for cyberrisk management. This leaves many organizations particularly susceptible to data breaches because of the diverse range and large amount of entry points that are at risk of unauthorized access. To Your Success , .
To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. Back then Paul was writing infosec stories for IDG and I was doing the same at ZDNet.
To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. Back then Paul was writing infosec stories for IDG and I was doing the same at ZDNet.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content