The Ultimate Cyber Conversation with the CyberHub Engage Podcast
Also available on Apple Podcasts and Google Play.
Similar Posts
Podcast Episode 6: Securing the fast-moving digital world
ByKayneYou have a remarkable economic incentive for threat actors to do their job. Unlike a fire, threat actors innovate. There’s not some new way we’re going to have a fire. I guarantee you by the end of the week, we’re going to have a dozen new ways for threat actors to do their jobs.
What is End-To-End Encryption? 7 Questions Answered
ByKayne“End-to-end encryption is generally agreed upon as being a useful technology for protecting the data of businesses and consumers,” said IEEE Senior Member Kayne McGladrey. “Online shopping, for example, would not be as popular or feasible if a consumer’s payment information could easily be intercepted. Similarly, private video calls over the internet by senior executives or government officials would be far too risky if anyone could watch.”
The Evolving Landscape of Cybersecurity for Medium-Sized Businesses
ByKayneIn recent years, we’ve seen a significant shift in the threats targeting businesses. “Everybody focused on the human harms, people couldn’t check into their hotel rooms; people couldn’t use an ATM… the nature of the technical exploits is not what we focus on in terms of harm… that’s not what we focus on in terms of harm,” states Kayne McGladrey, a field CISO at Hyperproof and senior IEEE member. This reiterates the transition from mere inconvenience to significant operational disruptions and economic consequences that cyber threats now pose.
Video: Futureproofing Now (Season #2, Ep. 11) – Cybersecurity & Cybertrust – Predictions & Implications
ByKayne“Bob Gourley emphasized that despite the dark topic of cyberthreats, we all leave with optimism. Carol Tang addressed the importance of continuous learning as part of a business leader’s proactive approach to mitigating risk and providing safety for customers. Kayne McGladrey emphasized the dual responsibility of today’s corporate decision makers with regard to cybersecurity: understand the complexity but act with transparency and specificity. It’s important to integrate cybersecurity awareness into the fabric of the organization, not sequester cybertrust solely within the domain of technology.”
Threat Hunters, Multi-factor Authentication and Mental Agility
ByKayneCybersecurity in a Hyperconnected World: By Kayne McGladrey, IEEE Member, and Stephen Cass, IEEE Spectrum Senior Editor
6 Tips for Conducting a Digital Literacy Assessment
ByKayneAn assessment of digital literacy isn’t a one-time event in an organization, according to McGladrey. “This is a continuous cycle for businesses to assess how employees use the tools provided, how they process information, how they’re creating content, and their critical thinking skills,” McGladrey said. And don’t make this a class that’s going to drag people down and eat most of their day, he added. “This continuous assessment process should be buttressed by brief just-in-time learning opportunities. No one wants to sit down for a four-hour digital literacy class for things they do know if they can instead get a five-minute tutorial on a new topic or technique they can apply to their current work.”