article thumbnail

On Chinese-Owned Technology Platforms

Schneier on Security

I am a co-author on a report published by the Hoover Institution: “ Chinese Technology Platforms Operating in the United States.”

article thumbnail

Policy vs Technology

Schneier on Security

I teach cybersecurity policy and technology at the Harvard Kennedy School of Government. My most recent two books, Data and Goliath -- about surveillance -- and Click Here to Kill Everybody -- about IoT security -- are really about the policy implications of technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Existential Risk and the Fermi Paradox

Schneier on Security

Technology changes the amplitude of the noise. The risks we face today are existential in a way they never have been before. The magnifying effects of technology enable short-term damage to cause long-term planet-wide systemic damage.

Risk 285
article thumbnail

Should There Be Limits on Persuasive Technologies?

Schneier on Security

But as with many things, technology is fundamentally changing the nature of persuasion. Democratic societies, in particular, are in dire need of a frank conversation about the role persuasion plays in them and how technologies are enabling powerful interests to target audiences.

article thumbnail

Cybersecurity Risk Quantification: A New Way to Understand Risks

Security Boulevard

Digital fraud and cybersecurity risks are always with us, and they’re constantly changing as businesses open new channels and adopt new technologies that criminals work to exploit.

Risk 97
article thumbnail

SecureMySocial Issued 5th US Patent For Social Media Security Technology

Joseph Steinberg

Patent number US 11,438,334 entitled Systems and Methods for Securing Social Media for Users and Businesses and Rewarding for Enhancing Security , discloses a robust invention that addresses the risks that posts to social media may pose to businesses and individuals alike.

Media 230
article thumbnail

Privacy As Enabling Technology

Security Boulevard

Recently, Google demonstrated a new smart glasses technology. The post Privacy As Enabling Technology appeared first on Security Boulevard.

article thumbnail

The Legal Risks of Security Research

Schneier on Security

Sunoo Park and Kendra Albert have published “ A Researcher’s Guide to Some Legal Risks of Security Research.” Our Guide gives the most comprehensive presentation to date of this landscape of legal risks, with an eye to both legal and technical nuance.

Risk 317
article thumbnail

How to Mitigate Risk Against Operational Technology (OT)

Security Boulevard

Operational technology, or OT, is hardware and software technologies that monitor and control a variety of physical operations including, but not limited to processes, devices, and even various infrastructures like public rail transportation.

Risk 71
article thumbnail

Cigent Technology Extends Firmware to Secure SSDs

Security Boulevard

Cigent Technology today launched Cigent Data Defense, an offering that combines existing multifactor authentication and encryption capabilities to secure sensitive data residing on solid-state drives (SSDs).

Firmware 102
article thumbnail

Best Practices for Hospitals To Manage Risks To CyberSecurity Created By Medical Technology And Information Systems: A Webinar With The CIA’s Former CyberSecurity Director And The Top CyberSecurity Columnist

Joseph Steinberg

Join Bonnie Stith, former Director of the CIA’s Center for Cyber Intelligence , and and Joseph Steinberg, renowned cybersecurity expert witness and columnist , for a special, free educational webinar, Best Practices for Asset Risk Management in Hospitals.

article thumbnail

Understanding the Insider Risk Solution Landscape—An Alphabet Soup of Agencies, Technologies, and Vendors

Security Boulevard

Not unlike the rest of the Internet Technology universe, the Insider Risk solutions landscape is cluttered with an alphabet of acronyms representing government agencies and technologies.

article thumbnail

What is Cybersecurity Risk Management?

eSecurity Planet

Risk management is a concept that has been around as long as companies have had assets to protect. This article looks at cybersecurity risk management, how to establish a risk management system, and best practices for building resilience. What is Cybersecurity Risk Management?

Risk 119
article thumbnail

Hospital & Healthcare Technology - Case Study

Approachable Cyber Threats

They also know that technology plays a vital role in delivering that standard of care. > COMPLEXITY Modern healthcare organizations continuously adopt cutting edge technology and integrate it with legacy technology.

article thumbnail

Technology’s contributions toward safety in healthcare

CyberSecurity Insiders

Technology in healthcare has the potential to make all the difference in terms of safety outcomes. But technology isn’t always safe. However, technology ultimately is doing more good than bad in healthcare. This blog was written by an independent guest blogger.

article thumbnail

CISO Liability Risk and Jail Time, (ISC)2 Bylaw Vote and the Value of Cybersecurity Certifications

Security Boulevard

Rafal Los, host of the popular Down the Security Rabbithole Podcast, joins us to discuss CISO liability risk and the ongoing discussion in the cybersecurity community about CISOs going to jail.

CISO 97
article thumbnail

The Increasing Insider Risk of Emerging Healthcare Technology

Security Boulevard

Earlier this month, the Health Sector Cybersecurity Coordination Center (HC3) issued a grave warning about the security implications of emerging technology in the healthcare sector. The post The Increasing Insider Risk of Emerging Healthcare Technology appeared first on DTEX Systems Inc.

article thumbnail

The ‘Hottest’ IT Security Technologies in 2022

CyberSecurity Insiders

Did you catch The ‘Hottest’ IT Security Technologies in 2022 webinar? This webinar focused on which security technologies are most widely deployed and most planned for acquisition in 2022. Deception technology / distributed honeypots. Deception technology / honeypots.

article thumbnail

National Security Risks of Late-Stage Capitalism

Schneier on Security

The company outsourced much of its software engineering to cheaper programmers overseas, even though that typically increases the risk of security vulnerabilities. In other words, the risk of a cyberattack can be transferred to the customers.

Risk 361
article thumbnail

RiskLens Wins Best Risk/Security Product in 2022 Risk Technology Awards

Security Boulevard

RiskLens , the leading provider of cyber risk quantification (CRQ) and cyber risk management software and services, has been awarded top honors as 2022 Cyber Risk/Security solution of the year by Risk.net in its annual Risk Technology Awards.

article thumbnail

StrikeForce Technologies Acquires Cybersecurity Risk Solutions LLC Expanding Its Identity and Endpoint Cyber-Defense Arsenal

Security Boulevard

New Acquisition Adds Comprehensive Cyber, Privacy & Data Protection Solutions April 08, 2021 08:00 ET | Source: StrikeForce Technologies, Inc. April 08, 2021 (GLOBE NEWSWIRE) — StrikeForce Technologies, Inc.

article thumbnail

Is Ransomware a Technology Pandemic in the Making?

Security Boulevard

The post Is Ransomware a Technology Pandemic in the Making? Cloud Security Cybersecurity Data Security Governance, Risk & Compliance Malware Security Boulevard (Original) Threat Intelligence Vulnerabilities Health Care Security international cybersecurity Ransomware U.S.

article thumbnail

Security risk assessment checklist

Tech Republic Security

Organizations, regardless of size, face ever-increasing information technology and data security threats. The post Security risk assessment checklist appeared first on TechRepublic. Everything from physical sites to data, applications, networks and systems are under attack.

Risk 98
article thumbnail

Threat Model Thursday: Technology Consumers

Adam Shostack

It opens “While many forms of data-driven surveillance are now a ‘fact’ of contemporary life amidst datafication, obtaining concrete knowledge of how different institutions exploit data presents an ongoing challenge, requiring the expertise and power to untangle increasingly complex and opaque technological and institutional arrangements.” They’re working on living their lives, and hoping technology helps.

article thumbnail

Replace Your SIEM with Neural Net Technology

Security Boulevard

Security Information Event Management (SIEM) systems are an outdated technology. It’s no longer enough to just manage information – today’s organizations need technology that can proactively detect and respond to dynamic threats as well. Why SIEM technology is no longer enough.

article thumbnail

Cyber Resiliency Begins with People and Process, Not Technology

CompTIA on Cybersecurity

With compounding cyber risks businesses must begin to take a holistic approach to cybersecurity that starts with people and process—then technology

article thumbnail

Next Up: Integrating Information and Communication Technology Risk Programs with Enterprise Risk Management

NSTIC

Given the increasing reliance of organizations on technologies over the past 50 years, a number of risk disciplines have evolved into full-fledged risk programs. In recent years, cybersecurity, supply chain, and privacy risk management programs have formalized best practices.

article thumbnail

Modern Technology, Modern Mistakes

Dark Reading

As employees grow more comfortable using new technologies, they could inadvertently be putting their enterprises at risk. And that leaves security teams having to defend an ever-expanding attack surface

article thumbnail

Qualys QSC Wrap-Up: Risk and Simplicity

Security Boulevard

Also, striking a balance between security and people, process and technology versus the risk/reward was something that both security leaders and business leaders need to confront and deal with every day.

Risk 98
article thumbnail

Enterprises Planning SecOps Technology Deployments

Dark Reading

With the easing of pandemic-related restrictions, enterprise defenders report they are investigating security operations technology to manage new risks that emerged over the past year

article thumbnail

CISA Outlines Cybersecurity Risks Facing K-12 Education

SecureWorld News

With the advent of advanced networking technologies, school districts have been able to improve the learning experience and become more efficient. However, these technological advancements also introduce new risks, particularly in the form of cyberattacks.

article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

So here it is - 10 Personal Financial Lessons for Technology Professionals. For example, the ICT industry (Information, Communication, Technology) was the 5th highest paying with an average salary of $104,874 (dollars are Aussie, take off about 30% for USD). Then there's this: Today, the Information & Communication Technology (ICT) industry dominates, with salaries from six roles within the industry featuring in the top 20. Which brings us to risk. Patience.

article thumbnail

Data Laundering Poses Privacy, Security Risks

Security Boulevard

As both customer bases and companies adapt to modern technologies and. The post Data Laundering Poses Privacy, Security Risks appeared first on Security Boulevard.

Risk 145
article thumbnail

4 Cybersecurity Risks Related to ChatGPT and AI-powered Chatbots

CompTIA on Cybersecurity

Tech companies should be cautious with ChatGPT and other AI chatbot tools—and evaluate possible cyber risks, says CompTIA CEO Todd Thibodeaux

article thumbnail

Managing Cybersecurity Risk in M&A

Cisco Security

As Technology Audit Director at Cisco, Jacob Bolotin focuses on assessing Cisco’s technology, business, and strategic risk. Risk Management and Formula One. Risk management, assessment, and assurance are vital to establishing this confidence.

Risk 106
article thumbnail

Best Risk Management Software for 2021

eSecurity Planet

Enterprise risk management software can provide risk monitoring, identification, analysis, assessment, and mitigation, all in one solution. . Jump to: Top Risk Management Software Vendors What is Risk Management? Top Risk Management Software Vendors.

Risk 93
article thumbnail

Encryption & Privacy Policy and Technology

Adam Shostack

The Open Technology Institute has an Open Letter to Law Enforcement in the U.S., UK, and Australia: Weak Encryption Puts Billions of Internet Users at Risk. In closely related news, nominations for the 2020 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies are open. Lastly, the Port of Seattle is considering putting rules in place around facial recognition technology.

article thumbnail

Capital One Fined $80M, 'Failed Appropriate Risk Management for the Cloud'

SecureWorld News

Major fines and major findings in the Capitol One data breach investigation. Here is what a U.S. regulatory agency revealed about the bank data breach

article thumbnail

Survey: Boards want to invest more in technology, data analytics

Tech Republic Security

Risk officers would rather stay in their compliance roles than add data usage to their duties, EY survey says

article thumbnail

Five ways smart technology is revolutionising the agriculture industry

CyberSecurity Insiders

The technological revolution of agriculture is here. Particularly in the context of climate change and a growing global population , the role of emerging technology in the farming industry will be critical to the success and thriving of future generations.

article thumbnail

How I Learned to Stop Worrying and Love Vendor Risk

Adam Levin

Insider risk, supply chain vulnerability and vendor risk all boil down to the same thing: the more people have access to your data, the more vulnerable it is to being leaked or breached. The typical narrative is that someone with inside knowledge of a company or its technology is able to exploit it to some sort of ill purpose. It seems increasingly apparent that risk has as much to do with a company’s HR department as it does its cybersecurity policy.

Risk 158
article thumbnail

Experts call for pause on AI training citing risks to humanity

Bleeping Computer

Technology Artificial IntelligenceAI professors and developers have co-signed an open letter to artificial intelligence labs, calling them to pause the development and training of AI systems more powerful than GPT-4 for at least six months. [.]

article thumbnail

Employees That Circumvent Access Introduce Risk

Security Boulevard

We are not a patient society, and we are made less patient as technology continues to evolve. The post Employees That Circumvent Access Introduce Risk appeared first on Security Boulevard.

Risk 98