Monthly Archives: February 2024

Reshaping the Focus of Cybersecurity

Key Insights from the International Counter Ransomware Initiative Statement By Todd Thorsen, Chief Information Security Officer, CrashPlan Earlier in November, media outlets widely reported the contents of a remarkable joint […]

Posted in Cyber Security News | Comments Off on Reshaping the Focus of Cybersecurity

Combating Terrorism Using Information Protection

By Milica D. Djekic The global landscape has changed significantly since a beginning of the new millennium as a threat to everyday life and work is arising day by day […]

Posted in Cyber Security News | Comments Off on Combating Terrorism Using Information Protection

SolarWinds Lawsuit Reinforces the Need for Critical Communication Between CISOs and the C-Suite

By Jose Seara, Founder and CEO, Denexus As demonstrated by recent developments in the legal matter between SolarWinds and the SEC, the landscape of CISO liability is expanding. After the […]

Posted in Cyber Security News | Comments Off on SolarWinds Lawsuit Reinforces the Need for Critical Communication Between CISOs and the C-Suite

How A Strong Digital Culture Is the Foundation For Successful Metaverse Exploration

Businesses must become digital-first to understand the emerging realm of the metaverse and develop the innovations that will drive success there. By Jaime McMahon, CDO, LineZero The metaverse is open […]

Posted in Cyber Security News | Comments Off on How A Strong Digital Culture Is the Foundation For Successful Metaverse Exploration

Is 2024 the Year of Cloud Repatriation?

By Eyal Arazi, cloud security manager at Radware Eyal Arazi, cloud security manager at Radware, looks at why organizations once committed to cloud-first and cloud-only strategies are now reevaluating their […]

Posted in Cyber Security News | Comments Off on Is 2024 the Year of Cloud Repatriation?

Top 6 Security Challenges of SMEs

By Michal Gil, Head of Product, CybeReady Small to Medium Enterprises (SMEs) are vital for innovation and economic growth, and their role in larger supply chains makes them an attractive […]

Posted in Cyber Security News | Comments Off on Top 6 Security Challenges of SMEs

NIS 2: From Obligation to Opportunity

By Jacques de La Rivière, CEO, Gatewatcher The world of cybersecurity is constantly evolving; not only in talent, products, and technologies, but also in regulatory requirements. As cyber threats evolve […]

Posted in Cyber Security News | Comments Off on NIS 2: From Obligation to Opportunity

Addressing Bias in Insider Risk Monitoring

By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often take similar steps to protect data from internal and outside […]

Posted in Cyber Security News | Comments Off on Addressing Bias in Insider Risk Monitoring

Ai, Cybersecurity Awareness, And Communication

Moving beyond the hype, are AI cybersecurity solutions as advanced as they claim? By John Trest, Chief Learning Officer, VIPRE Security Group The emergence of numerous AI-driven cybersecurity products emphasizes […]

Posted in Cyber Security News | Comments Off on Ai, Cybersecurity Awareness, And Communication

Beyond Traditional Cyber Defences: The Rise of Outcome-Based Security In Modern Business

By Paul Brucciani, Cyber Security Advisor at WithSecure™ Cyber security is no longer just about keeping systems and devices safe, it’s also become central in enabling business to achieve their […]

Posted in Cyber Security News | Comments Off on Beyond Traditional Cyber Defences: The Rise of Outcome-Based Security In Modern Business

Why Cybersecurity Maturity Model Certification (CMMC) Matters for All Businesses, Not Just DoD Contractors

A Vital Set of Cybersecurity Best Practices By John Funk, Creative Consultant, SevenAtoms A new cybersecurity mandate being rolled out by the Pentagon has implications that reach beyond the military […]

Posted in Cyber Security News | Comments Off on Why Cybersecurity Maturity Model Certification (CMMC) Matters for All Businesses, Not Just DoD Contractors

AI: The Human Touch in Cybersecurity Recruitment

Harnessing the Digital Scout for Cybersecurity’s Future By Darrin Straff, Senior Staffing Consultant, NinjaJobs Introduction: In the digital age, where cybersecurity threats are ever-evolving, AI’s role in strengthening our defenses […]

Posted in Cyber Security News | Comments Off on AI: The Human Touch in Cybersecurity Recruitment

AI-Enhanced Identity Fraud: A Mounting Threat to Organizations and Users

Identifying the most common AI-enhanced cyber-attack methods and strategies to mitigate them By Philipp Pointner, Chief of Digital Identity at Jumio While AI-driven automation brings benefits, it also gives hackers […]

Posted in Cyber Security News | Comments Off on AI-Enhanced Identity Fraud: A Mounting Threat to Organizations and Users

Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game

If you’re like me, you are hearing a lot right now about cyber resiliency, the need to protect critical infrastructure across all sectors, and “be resilient” to the constant onslaught […]

Posted in Cyber Security News, Featured | Comments Off on Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game

AI in DevSecOps: Moving from A Co-Pilot to An Autopilot

By Stephen Chin, VP of Developer Relations, JFrog What do autonomous driving and software (SW) development have in common? At first glance, not much. But when taking a closer look […]

Posted in Cyber Security News | Comments Off on AI in DevSecOps: Moving from A Co-Pilot to An Autopilot

Addressing the Particular Cybersecurity Challenge of Discrete Manufacturing

By Dave Purdy, Regional Vice President of Sales, North America, TXOne Networks Though it’s often treated as a borrowed approach from the information technology (IT) world, cybersecurity for operational technology […]

Posted in Cyber Security News | Comments Off on Addressing the Particular Cybersecurity Challenge of Discrete Manufacturing

Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments

By Victor Atkins, Director | Cybersecurity, 1898 & Co. The rise in the age of digitalization has provided numerous benefits for modern society, from the ability to conduct a telehealth […]

Posted in Cyber Security News | Comments Off on Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments

How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance

Steps To Implement Cyber Controls and Processes By Juliana Spofford, General Counsel and Chief Privacy Officer, Aidentified In today’s tech world, it is often difficult to determine which businesses you […]

Posted in Cyber Security News | Comments Off on How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance

3 New Risks That CISOs Will Face in 2024

By Daniel Barber, CEO, DataGrail Throughout 2023, data privacy has been front and center in conversations about cybersecurity. Consumers everywhere are increasingly vigilant about how their data is being gathered […]

Posted in Cyber Security News | Comments Off on 3 New Risks That CISOs Will Face in 2024

The Tech Jobs That AI Will Not Disrupt

By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to […]

Posted in Cyber Security News | Comments Off on The Tech Jobs That AI Will Not Disrupt

Striking The Right Balance: Cloud and Cyber Priorities for SMEs

By Mark Allen, Head of cyber, CloudCoCo As small and medium-sized enterprises (SMEs) embark on their digitalization journey, they face a crucial dilemma: Should they prioritize the adoption of cloud […]

Posted in Cyber Security News | Comments Off on Striking The Right Balance: Cloud and Cyber Priorities for SMEs

Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines

SEC’s New Guidelines Prompt Proactive Cyber Risk Management By Meghan Maneval, Director of Technical Product Management at RiskOptics Recently, the Securities and Exchange Commission (SEC) adopted rules about the handling […]

Posted in Cyber Security News | Comments Off on Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines

The Cybersecurity Bridge: A Necessary Connection for IT and Communications

By Jeff Hahn, principal of Hahn, and Kenneth Holley, Principal and chairman of Silent Quadrant With the increasing unpredictability and sophistication of cyber threats, IT and communications departments must align […]

Posted in Cyber Security News | Comments Off on The Cybersecurity Bridge: A Necessary Connection for IT and Communications

The Crumbling Castle

By Jaye Tillson, Director of Strategy, Axis Security In the realm of IT security, the traditional “castle and moat” strategy involved building a strong perimeter around the corporate network, like […]

Posted in Cyber Security News | Comments Off on The Crumbling Castle

Shifting Left Means Shifting Smart: Managing Software Risk With ASPM

By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up software delivery, security practices have had to evolve. Development teams […]

Posted in Cyber Security News | Comments Off on Shifting Left Means Shifting Smart: Managing Software Risk With ASPM

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X