News

FedRAMP Rev. 5: How Cloud Service Providers Can Prepare
Dark Reading

FedRAMP Rev. 5: How Cloud Service Providers Can Prepare

What cloud service providers need to know to prepare for FedRAMP Baselines Rev. 5, as documented in the new Transition Guide.
Data loss prevention vendors tackle gen AI data risks
CSO Online

Data loss prevention vendors tackle gen AI data risks

Businesses are using DLP tools to help secure generative AI and reduce risks of ChatGPT and similar applications.
How Informed is the Board of Directors on Cybersecurity Risks?
The Cybersecurity Readiness Podcast Series

How Informed is the Board of Directors on Cybersecurity Risks?

With the global cost of cybercrime expected to reach $10.5 trillion by 2025, cybersecurity has become a board-level imperative. According to the Diligent Institute survey 'What Directors Think,' board members ranked cybersecurity as the most challenging issue to oversee. Even though boards say...
Is basic cyber hygiene enough in the age of AI?
Authentic Press Network News

Is basic cyber hygiene enough in the age of AI?

For years, consumers and businesses alike have been given the same cybersecurity advice: use strong passwords, back up your data on a regular basis and use multi-factor authentication where you can. These three pillars are the foundation of what is referred to as cyber hygiene, and they help people keep…
Kayne McGladrey – Ask A CISSP Season 2 Episode 8
Ask A CISSP

Kayne McGladrey – Ask A CISSP Season 2 Episode 8

This week on Ask A CISSP, we have an interview with Kayne McGladrey, Field CISO at Hyperproof. In this very entertaining episode, we'll learn Kayne's amazing...
Emerging cyber threats in 2023 from AI to quantum to data poisoning
CSO Online

Emerging cyber threats in 2023 from AI to quantum to data poisoning

In cybersecurity’s never-ending cat-and-mouse game with hackers and grifters, the threats are always evolving. Here are some of the main attacks experts see as the biggest and baddest on the horizon.
Why end-to-end encryption matters
Help Net Security

Why end-to-end encryption matters

End-to-end encryption (E2EE) ensures that only two parties can access data, and helps to protect consumers and businesses from prying eyes.
The four pillars of cloud security
CSHub

The four pillars of cloud security

Exploring the cornerstones of the cloud security industry, cloud evolution and cloud migration
Universities Tap Student Talent to Support Security Operations
EdTech Magazine

Universities Tap Student Talent to Support Security Operations

Student-staffed security operations centers provide on-the-job training and valuable technology skills.
Generative AI: Cybersecurity Weapon, But Not Without Adaptable, Creative (Human) Thinkers
TechRepublic

Generative AI: Cybersecurity Weapon, But Not Without Adaptable, Creative (Human) Thinkers

Cybersecurity expert Kayne McGladrey speaks about why AI cannot do what creative people can, and the important role of generative AI in SOCs.
Tasks that bog down security teams (and what to do about them)
CSO Online

Tasks that bog down security teams (and what to do about them)

Budgetary and staffing issues are putting pressure on CISOs and other security leaders. Here are 10 tasks that typically bog cyber teams down and what some security chiefs did to solve the problems.
What is End-To-End Encryption? 7 Questions Answered
IEEE Transmitter

What is End-To-End Encryption? 7 Questions Answered

A typical smartphone user may receive hundreds of SMS messages each week. Social media services keep their users engaged by pushing dozens more direct Messaging apps and social media services offer end-to-end encryption, but many consumers don’t understand it.
Allan Interviews EVERYONE at Black Hat
The Cyber Ranch Podcast

Allan Interviews EVERYONE at Black Hat

Did you miss Black Hat this year?  Well you won't miss the great conversations that were had, as Allan captured so many good ones for this special Black Hat retrospective episode.   Did you get to attend Black Hat this year?  See if your experience was as amazing as Allan's!  This show is LIVE and untarnished.  It's the real Black Hat experience!   In this episode, Allan talks to (in alphabetical order, with timestamps):   1:02 - Dani Woolf, Founder & CEO at Audience 1st 3:06 - Daniel Blackford, Manager of Threat Research @ Proofpoint 6:48 - Dean Sysman, CEO @ Axonius 8:19 - Deepen Desai, Global CISO & Head of Security Research @ ZScaler 15:39 - G. Mark Hardy, host of the CISO Tradecraft Podcast 18:42 - Glen Pendley, CTO @ Tenable 23:54 - Kayne McGladrey, Field CISO @ Hyperproof 24:52 - Leigh Honeywell, CEO @ Tall Poppy 25:52 - Masha Sedova, CEO @ Elevate Security 28:47 - Nate Warfield, Director of Research @ Eclypsium 31:43 - Rich Berthao, Cybersecurity Leader, Planner, and Innovator 32:41 - Rob Labbé, CEO and CISO in Residence for the Mining and Metals ISAC This show captures an amazing week! Sponsored by our good friends at Seraphic Security. Seraphic helps you defend your digital workplace with security and DLP for every browser and essential desktop apps like Microsoft Teams, Slack, Asana, and Notion. Protect against compromise and prevent data loss via the web with Seraphic.
CIO

Experts advise on how to build a successful hybrid work security strategy

Take steps to improve the overall security posture by reducing the attack surface, increasing awareness and visibility, while driving a seamless user experience for the hybrid workforce
Secure collaboration: Adopt an approach that balances people and technology
CIO

Secure collaboration: Adopt an approach that balances people and technology

Balancing security and seamless collaboration has always been a challenge. Industry influencers highlight key considerations to assure secure experiences for workers in this crowd-sourced article.
Criminals Are Flocking to a Malicious Generative AI Tool
GovInfoSecurity

Criminals Are Flocking to a Malicious Generative AI Tool

Cybercriminals are using an evil twin of OpenAI's generative artificial intelligence tool Chat GPT. It's called FraudGPT, it's available on criminal forums, and it
How Discord’s Parental Controls Can Keep Kids Safe
Lifewire

How Discord’s Parental Controls Can Keep Kids Safe

Having your kids on chat apps like Discord can introduce dangers, but experts say new parental controls can help.
How Will the New National Cybersecurity Strategy Be Implemented?
Information Week

How Will the New National Cybersecurity Strategy Be Implemented?

The Biden Administration released a National Cybersecurity Strategy in March, and now, it has followed up with a comprehensive plan for implementation.
How Parents Can Use Discord’s Family Center
Parents

How Parents Can Use Discord’s Family Center

More teens are gravitating toward the social media app Discord, which just launched a new Family Center. Learn more about how that can help parents protect their kids.
Why and how CISOs should work with lawyers to address regulatory burdens
CSO Online

Why and how CISOs should work with lawyers to address regulatory burdens

As the scope of cybersecurity related regulations grows, CISOs may need to partner more closely with legal teams to understand the changing requirements.