News

What to Know About the Proposed New HIPAA Rules
Security Boulevard

What to Know About the Proposed New HIPAA Rules

If approved, the proposed new HIPAA rules will reshape the landscape of healthcare cybersecurity, partially addressing the recent OIG report’s findings on the ineffectiveness of current HIPAA audits. For CISOs, these changes present both opportunities and challenges as they work to enhance their organizations’ cybersecurity practices. The updated compliance requirements for electronic protected health information...
CXOtoday News Desk

Is Basic Cyber Hygiene Enough in the Age of AI?

For years, consumers and businesses alike have been given the same cybersecurity advice: use strong passwords, back up your data on a regular basis, and use multi-factor authentication where you can. These three pillars are the foundation of what is referred to as cyber hygiene, and they help people keep their personal information secure. But […]
Top 7 Cybersecurity Threats for 2024
TechRepublic

Top 7 Cybersecurity Threats for 2024

The global threat landscape is undergoing deep changes, driven by emerging technologies, new tactics and shifting geopolitical dynamics.
Why enterprises need cyber insurance — how and what to buy
SDxCentral

Why enterprises need cyber insurance — how and what to buy

While many enterprises have some form of cyber insurance coverage, only 26% have a standalone policy that specifically addresses cyber risk,
Communicating Risk with Your Leadership Team
FutureCon

Communicating Risk with Your Leadership Team

In response to the ever-changing risk environment, company leadership is asking more and more questions about how to best manage risk. But being able to answer those questions means having a system and process in place to accurately document, manage, mitigate, and report on those risks. Luckily, some frameworks and...
Thinkers360 Predictions Series – 2024 Predictions for Cybersecurity
Thinkers360

Thinkers360 Predictions Series – 2024 Predictions for Cybersecurity

Thinkers360 2024 Predictions for Cybersecurity are member-sourced from our opt-in B2B thought leader community with 100M+ followers on social media combined.
CSO Online

3 ways to fix old, unsafe code that lingers from open-source and legacy programs

Code vulnerability is not only a risk of open-source code, with many legacy systems still in use — whether out of necessity or lack of visibility — the truth is that cybersecurity teams will inevitably need to address the problem.
Expert Predictions for 2024
CDO Magazine

Expert Predictions for 2024

Using AI Isn’t As Easy As It Seems
CXOtoday News Desk

Using AI Isn’t As Easy As It Seems

Companies everywhere want to harness AI’s potential. But here’s the catch: integrating AI into existing work isn’t as straightforward as flipping a switch. Integrating other technologies – from cloud computing to IoT devices – has often been met with mixed success. Some evidence suggests that digital transformation initiatives – a broad term used to describe the digitization […]
Integration of AI: A strategic imperative for organizations
infotech

Integration of AI: A strategic imperative for organizations

Companies are eager to tap into the power of AI, but it's not as easy as flipping a switch. Integrating AI into existing workflows
Keynote Presentation: Expert Predictions for 2024
GPSec Tech Summit 2023

Keynote Presentation: Expert Predictions for 2024

Join us for an illuminating panel discussion, ‘Expert Predictions for 2024’, where seasoned experts delve into the future of cybersecurity. This dynamic discussion will explore controversial key areas shaping the landscape in the coming year.
Kayne McGladrey: The CISO’s Role Is To Advise on Business Risk
The PrOTect OT Cybersecurity Podcast

Kayne McGladrey: The CISO’s Role Is To Advise on Business Risk

In this episode, Aaron and Kayne McGladrey discuss: - Strategic alignment of cybersecurity with business risk - Navigating the changing landscape of cybersecurity - Empowering CISOs in the evolving landscape of cybersecurity - The challenges and opportunities of generative AI
VCHH11 – [LIVE] The Scary Truth About Data Privacy – State of Security: Expert Insights on Cybersecurity Operations and the Business of Cyber
Virtual CISO Happy Hour

VCHH11 – [LIVE] The Scary Truth About Data Privacy – State of Security: Expert Insights on Cybersecurity Operations and the Business of Cyber

The conversation focuses on privacy and how to protect personal and corporate data. The speakers discuss core principles for safeguarding customer and employee data, including data minimization, secure coding practices, and continuous testing of controls. They emphasize the importance of communication with the board and legal teams, as well as the need for data retention and disposition schedules. The conversation also covers privacy training for software developers and IT professionals, as well as contractual obligations for vendors regarding data privacy. The speakers highlight the need for a national privacy standard in the US. The conversation covers various aspects of privacy, including data deletion and obfuscation, mobile device management and privacy, the effectiveness of privacy controls, future trends in privacy, and the importance of policies and training.
The Cyber Security Recruiter talks to Kayne McGladrey, field CISO at Hyperproof
The Cyber Security Recruiter

The Cyber Security Recruiter talks to Kayne McGladrey, field CISO at Hyperproof

Here is Kayne's Linkedin URL: https://www.linkedin.com/in/kaynemcgladrey/And the book he mentioned: Alaine de Botton The Pleasures and Sorrows of Work https:...
IEEE Transmitter

Quantum AI

Getting AI Right: 3 Challenges for the Future
IEEE Transmitter

Getting AI Right: 3 Challenges for the Future

When ChatGPT burst onto the scene in late 2022, it didn't just showcase the leaps AI had made; it painted a future filled with possibilities, shaping how AI is full of promise, but potential risks abound.
Impact of Technology 2024
IEEE Transmitter

Impact of Technology 2024

The speed of technology advancement and adoption has never been faster. We surveyed global technology leaders and asked our Impact Creators for their insights on what to expect.
ISC2

Bridging the Gap: Communicating Cyber Risks as Business Imperatives

As CISOs make plans to secure operating budgets for the new financial year, they face the age-old challenge of convincing stakeholders, who often see cybersecurity and privacy as a cost center, to invest in this area. It's time to change the narrative. Discover how to drive more productive conversations about cybersecurity as a strategic growth enabler. Take home actionable ideas for proactively managing controls and risks, increasing efficiency and reducing costs.
PCI Compliance & the Importance of Penetration Testing
StateTech Magazine

PCI Compliance & the Importance of Penetration Testing

State & local governments processing credit card payments need to know how to conduct a penetration test to maintain PCI compliance.\
Next-Generation Cybersecurity Defenses Coalesce for Space Systems
Via Satellite

Next-Generation Cybersecurity Defenses Coalesce for Space Systems

Experts are optimistic about the future of cybersecurity as it relates to space, despite growing concern over the modern threat environment.