News

How digital wallets work, and best practices to use them safely
Help Net Security

How digital wallets work, and best practices to use them safely

Learn how digital wallets work, and best practices on how you can use them safely since digital payments are now mainstream and evolving.
The Jobs of Tomorrow: Insights on AI and the Future of Work
IEEE Transmitter

The Jobs of Tomorrow: Insights on AI and the Future of Work

The nature of work is evolving at an unprecedented pace. The rise of generative AI has accelerated data analysis, expedited the production of software A panel of experts from IEEE discuss the ways AI has changed the way we work.
Zero trust secures agile business transformation  – Secure, simplify, and transform your business
CIO

Zero trust secures agile business transformation  – Secure, simplify, and transform your business

Reimagining zero trust as a transformative IT principle has big potential payoffs
How AI could change threat detection
TechTarget

How AI could change threat detection

The value of AI in threat detection is becoming increasingly evident. Learn more about AI benefits and how they could increase as the technology matures.
What to Know About the Proposed New HIPAA Rules
Security Boulevard

What to Know About the Proposed New HIPAA Rules

If approved, the proposed new HIPAA rules will reshape the landscape of healthcare cybersecurity, partially addressing the recent OIG report’s findings on the ineffectiveness of current HIPAA audits. For CISOs, these changes present both opportunities and challenges as they work to enhance their organizations’ cybersecurity practices. The updated compliance requirements for electronic protected health information...
CXOtoday News Desk

Is Basic Cyber Hygiene Enough in the Age of AI?

For years, consumers and businesses alike have been given the same cybersecurity advice: use strong passwords, back up your data on a regular basis, and use multi-factor authentication where you can. These three pillars are the foundation of what is referred to as cyber hygiene, and they help people keep their personal information secure. But […]
Top 7 Cybersecurity Threats for 2024
TechRepublic

Top 7 Cybersecurity Threats for 2024

The global threat landscape is undergoing deep changes, driven by emerging technologies, new tactics and shifting geopolitical dynamics.
Why enterprises need cyber insurance — how and what to buy
SDxCentral

Why enterprises need cyber insurance — how and what to buy

While many enterprises have some form of cyber insurance coverage, only 26% have a standalone policy that specifically addresses cyber risk,
Communicating Risk with Your Leadership Team
FutureCon

Communicating Risk with Your Leadership Team

In response to the ever-changing risk environment, company leadership is asking more and more questions about how to best manage risk. But being able to answer those questions means having a system and process in place to accurately document, manage, mitigate, and report on those risks. Luckily, some frameworks and...
Thinkers360 Predictions Series – 2024 Predictions for Cybersecurity
Thinkers360

Thinkers360 Predictions Series – 2024 Predictions for Cybersecurity

Thinkers360 2024 Predictions for Cybersecurity are member-sourced from our opt-in B2B thought leader community with 100M+ followers on social media combined.
CSO Online

3 ways to fix old, unsafe code that lingers from open-source and legacy programs

Code vulnerability is not only a risk of open-source code, with many legacy systems still in use — whether out of necessity or lack of visibility — the truth is that cybersecurity teams will inevitably need to address the problem.
Expert Predictions for 2024
CDO Magazine

Expert Predictions for 2024

Using AI Isn’t As Easy As It Seems
CXOtoday News Desk

Using AI Isn’t As Easy As It Seems

Companies everywhere want to harness AI’s potential. But here’s the catch: integrating AI into existing work isn’t as straightforward as flipping a switch. Integrating other technologies – from cloud computing to IoT devices – has often been met with mixed success. Some evidence suggests that digital transformation initiatives – a broad term used to describe the digitization […]
Integration of AI: A strategic imperative for organizations
infotech

Integration of AI: A strategic imperative for organizations

Companies are eager to tap into the power of AI, but it's not as easy as flipping a switch. Integrating AI into existing workflows
Keynote Presentation: Expert Predictions for 2024
GPSec Tech Summit 2023

Keynote Presentation: Expert Predictions for 2024

Join us for an illuminating panel discussion, ‘Expert Predictions for 2024’, where seasoned experts delve into the future of cybersecurity. This dynamic discussion will explore controversial key areas shaping the landscape in the coming year.
Kayne McGladrey: The CISO’s Role Is To Advise on Business Risk
The PrOTect OT Cybersecurity Podcast

Kayne McGladrey: The CISO’s Role Is To Advise on Business Risk

In this episode, Aaron and Kayne McGladrey discuss: - Strategic alignment of cybersecurity with business risk - Navigating the changing landscape of cybersecurity - Empowering CISOs in the evolving landscape of cybersecurity - The challenges and opportunities of generative AI
VCHH11 – [LIVE] The Scary Truth About Data Privacy – State of Security: Expert Insights on Cybersecurity Operations and the Business of Cyber
Virtual CISO Happy Hour

VCHH11 – [LIVE] The Scary Truth About Data Privacy – State of Security: Expert Insights on Cybersecurity Operations and the Business of Cyber

The conversation focuses on privacy and how to protect personal and corporate data. The speakers discuss core principles for safeguarding customer and employee data, including data minimization, secure coding practices, and continuous testing of controls. They emphasize the importance of communication with the board and legal teams, as well as the need for data retention and disposition schedules. The conversation also covers privacy training for software developers and IT professionals, as well as contractual obligations for vendors regarding data privacy. The speakers highlight the need for a national privacy standard in the US. The conversation covers various aspects of privacy, including data deletion and obfuscation, mobile device management and privacy, the effectiveness of privacy controls, future trends in privacy, and the importance of policies and training.
The Cyber Security Recruiter talks to Kayne McGladrey, field CISO at Hyperproof
The Cyber Security Recruiter

The Cyber Security Recruiter talks to Kayne McGladrey, field CISO at Hyperproof

Here is Kayne's Linkedin URL: https://www.linkedin.com/in/kaynemcgladrey/And the book he mentioned: Alaine de Botton The Pleasures and Sorrows of Work https:...
IEEE Transmitter

Quantum AI

Getting AI Right: 3 Challenges for the Future
IEEE Transmitter

Getting AI Right: 3 Challenges for the Future

When ChatGPT burst onto the scene in late 2022, it didn't just showcase the leaps AI had made; it painted a future filled with possibilities, shaping how AI is full of promise, but potential risks abound.