Remove Cybersecurity Remove Information Security Remove Webinar
article thumbnail

SEC Cybersecurity Rules

Adam Shostack

The SEC has important new cybersecurity rules Last week, the SEC issued new cybersecurity guidance. Fifteen years ago, Andrew Stewart and I published The New School of Information Security , in which we called for greater disclosure of cyber incidents and learning more from them. More on this below. More on this below. [W]e

article thumbnail

Combined SOC Webinar Q&A: From EDR to ITDR and ASO … and ChatGPT

Anton on Security

In recent weeks, I did two fun webinars related to Security Operations, and there was a lot of fun Q&A. For extra fun, I had ChatGPT answer some of them, to see if it can replace me :-) So, first, ISACA webinar “Modernize Your SOC for the Future” focused on our Autonomic Security Operations vision. with the SOC?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Empowering Women in Cybersecurity: Insights from ISC2's Latest Study

SecureWorld News

The cybersecurity landscape is witnessing a transformative shift, with an increasing number of women entering the field through non-traditional pathways. A recent study by ISC2 highlights this trend, revealing how diverse educational backgrounds and experiences are enriching the cybersecurity workforce.

article thumbnail

How to apply for the grant scheme to improve SME cybersecurity

BH Consulting

Irish small and medium enterprises selling internationally can avail of a grant scheme to review and update their cybersecurity. The Cyber Security Review Grant scheme subsidises both the cost of an initial assessment and subsequent remediation plan. Who can apply for the Cyber Security Review Grant? Why choose BH Consulting?

article thumbnail

Get an Untrusted Security Advisor! Have Fun, Reduce Fail!

Anton on Security

Many organizations are looking for trusted advisors , and this applies to our beloved domain of cyber/information security. If you need a TLDR, you will see that an untrusted cybersecurity advisor can be used for the majority of muse use cases (give me ideas and inspiration! test my ideas!) LLMs should not (yet?)

article thumbnail

Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat

Security Boulevard

government is urging software makers to adopt secure application-development practices that help prevent buffer overflow attacks. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) called buffer overflow vulnerabilities unforgivable defects that put national and economic security at risk.

Banking 64
article thumbnail

Cybersecurity Snapshot: CSA Outlines Data Security Challenges and Best Practices, While ISACA Offers Tips To Retain IT Pros

Security Boulevard

For more information about data security , check out these Tenable resources: The value of data security integrated into a unified cloud security strategy (infographic) Harden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resources (blog) Know Your Exposure: Is Your Cloud Data Secure in the Age of AI? (on-demand