Similar Posts
15 Cool Jobs You Could Have in the Future
ByKayne
Online threats are only getting more and more sophisticated as technology continues to advance. Kayne McGladrey, Director of Security and Information Technology at Pensar Development, says organizations will need to study the tools, techniques, and procedures (TTPs) of each cyber-attacker in order to build a defensive strategy to contain them.
Thinkers360 Predictions Series – 2020 Predictions for Cybersecurity
ByKayne
Venture capitalists will accelerate feature development via mergers and acquisitions. In recent years, VCs have funded point solution vendors for technologies like SOAR and UEBA. These are features, not stand-alone technologies, and it’s often cheaper for market leaders to buy rather than build new features. CISOs should be aware of this market reality, as buying early-stage cybersecurity from a startup carries the risk of unintentionally having a business relationship with a much larger vendor within two years, and consequently needing to either buy the larger technology solution or rip and replace after the acquisition closes.
FedRAMP Rev. 5: How Cloud Service Providers Can Prepare
ByKayne
This article covers high-level information that cloud service providers (CSPs) need to know to prepare for their transition to FedRAMP Rev. 5, as documented in the “FedRAMP Baselines Rev. 5 Transition Guide.”
CYBER SECURITY FOR SMALL BUSINESSES AND CONSULTANTS
ByKayne
Do you feel like you are overwhelmed trying to run your business while defending against the latest cyber threats? Join Kayne McGladrey, speaker, author and Director of Information Security Services for Integral Partners (http://www.ipllc.co) for our upcoming presentation on taking a proactive, risk-oriented approach to cyber security for individual consultants and small businesses.
Kayne will discuss:
– Why you should manage risks based on user identity instead of chasing the latest threats
– How individual consultants can protect themselves
– A vendor-neutral reference architecture for cyber security at small businesses
We will have time for Q&A at the end of the presentation.
3 Phases to Simplify Cyber Risk Management
ByKayne
Cybersecurity risk management exists to help businesses make informed decisions when allocating their limited resources. Although there are several ways of measuring risks and several more risk frameworks, there is no “right” way to conduct risk management other than consistency. Provided that a business documents, discusses, and acts on risk data, the supporting technologies and formulas are not particularly relevant to business leaders or board members.
How Discord’s Parental Controls Can Keep Kids Safe
ByKayne
Discord relies heavily on server moderators to enforce community rules, IEEE Senior Member Kayne McGladrey said via email. This moderation is done on a server-by-server basis.
“In practice, this enables smaller private servers to feature far more informal conversations and rules than a public community server – it’s possible that kids can see hateful content, such as racism or cyber-bullying, happen on these types of servers where the moderators are less engaged,” McGladrey added.