News

Impact of Technology 2024
IEEE Transmitter

Impact of Technology 2024

The speed of technology advancement and adoption has never been faster. We surveyed global technology leaders and asked our Impact Creators for their insights on what to expect.
ISC2

Bridging the Gap: Communicating Cyber Risks as Business Imperatives

As CISOs make plans to secure operating budgets for the new financial year, they face the age-old challenge of convincing stakeholders, who often see cybersecurity and privacy as a cost center, to invest in this area. It's time to change the narrative. Discover how to drive more productive conversations about cybersecurity as a strategic growth enabler. Take home actionable ideas for proactively managing controls and risks, increasing efficiency and reducing costs.
PCI Compliance & the Importance of Penetration Testing
StateTech Magazine

PCI Compliance & the Importance of Penetration Testing

State & local governments processing credit card payments need to know how to conduct a penetration test to maintain PCI compliance.\
Next-Generation Cybersecurity Defenses Coalesce for Space Systems
Via Satellite

Next-Generation Cybersecurity Defenses Coalesce for Space Systems

Experts are optimistic about the future of cybersecurity as it relates to space, despite growing concern over the modern threat environment.
FedRAMP Rev. 5: How Cloud Service Providers Can Prepare
Dark Reading

FedRAMP Rev. 5: How Cloud Service Providers Can Prepare

What cloud service providers need to know to prepare for FedRAMP Baselines Rev. 5, as documented in the new Transition Guide.
Data loss prevention vendors tackle gen AI data risks
CSO Online

Data loss prevention vendors tackle gen AI data risks

Businesses are using DLP tools to help secure generative AI and reduce risks of ChatGPT and similar applications.
How Informed is the Board of Directors on Cybersecurity Risks?
The Cybersecurity Readiness Podcast Series

How Informed is the Board of Directors on Cybersecurity Risks?

With the global cost of cybercrime expected to reach $10.5 trillion by 2025, cybersecurity has become a board-level imperative. According to the Diligent Institute survey 'What Directors Think,' board members ranked cybersecurity as the most challenging issue to oversee. Even though boards say...
Is basic cyber hygiene enough in the age of AI?
Authentic Press Network News

Is basic cyber hygiene enough in the age of AI?

For years, consumers and businesses alike have been given the same cybersecurity advice: use strong passwords, back up your data on a regular basis and use multi-factor authentication where you can. These three pillars are the foundation of what is referred to as cyber hygiene, and they help people keep…
Kayne McGladrey – Ask A CISSP Season 2 Episode 8
Ask A CISSP

Kayne McGladrey – Ask A CISSP Season 2 Episode 8

This week on Ask A CISSP, we have an interview with Kayne McGladrey, Field CISO at Hyperproof. In this very entertaining episode, we'll learn Kayne's amazing...
Emerging cyber threats in 2023 from AI to quantum to data poisoning
CSO Online

Emerging cyber threats in 2023 from AI to quantum to data poisoning

In cybersecurity’s never-ending cat-and-mouse game with hackers and grifters, the threats are always evolving. Here are some of the main attacks experts see as the biggest and baddest on the horizon.
Why end-to-end encryption matters
Help Net Security

Why end-to-end encryption matters

End-to-end encryption (E2EE) ensures that only two parties can access data, and helps to protect consumers and businesses from prying eyes.
The four pillars of cloud security
CSHub

The four pillars of cloud security

Exploring the cornerstones of the cloud security industry, cloud evolution and cloud migration
Universities Tap Student Talent to Support Security Operations
EdTech Magazine

Universities Tap Student Talent to Support Security Operations

Student-staffed security operations centers provide on-the-job training and valuable technology skills.
Generative AI: Cybersecurity Weapon, But Not Without Adaptable, Creative (Human) Thinkers
TechRepublic

Generative AI: Cybersecurity Weapon, But Not Without Adaptable, Creative (Human) Thinkers

Cybersecurity expert Kayne McGladrey speaks about why AI cannot do what creative people can, and the important role of generative AI in SOCs.
Tasks that bog down security teams (and what to do about them)
CSO Online

Tasks that bog down security teams (and what to do about them)

Budgetary and staffing issues are putting pressure on CISOs and other security leaders. Here are 10 tasks that typically bog cyber teams down and what some security chiefs did to solve the problems.
What is End-To-End Encryption? 7 Questions Answered
IEEE Transmitter

What is End-To-End Encryption? 7 Questions Answered

A typical smartphone user may receive hundreds of SMS messages each week. Social media services keep their users engaged by pushing dozens more direct Messaging apps and social media services offer end-to-end encryption, but many consumers don’t understand it.
Allan Interviews EVERYONE at Black Hat
The Cyber Ranch Podcast

Allan Interviews EVERYONE at Black Hat

Did you miss Black Hat this year?  Well you won't miss the great conversations that were had, as Allan captured so many good ones for this special Black Hat retrospective episode.   Did you get to attend Black Hat this year?  See if your experience was as amazing as Allan's!  This show is LIVE and untarnished.  It's the real Black Hat experience!   In this episode, Allan talks to (in alphabetical order, with timestamps):   1:02 - Dani Woolf, Founder & CEO at Audience 1st 3:06 - Daniel Blackford, Manager of Threat Research @ Proofpoint 6:48 - Dean Sysman, CEO @ Axonius 8:19 - Deepen Desai, Global CISO & Head of Security Research @ ZScaler 15:39 - G. Mark Hardy, host of the CISO Tradecraft Podcast 18:42 - Glen Pendley, CTO @ Tenable 23:54 - Kayne McGladrey, Field CISO @ Hyperproof 24:52 - Leigh Honeywell, CEO @ Tall Poppy 25:52 - Masha Sedova, CEO @ Elevate Security 28:47 - Nate Warfield, Director of Research @ Eclypsium 31:43 - Rich Berthao, Cybersecurity Leader, Planner, and Innovator 32:41 - Rob Labbé, CEO and CISO in Residence for the Mining and Metals ISAC This show captures an amazing week! Sponsored by our good friends at Seraphic Security. Seraphic helps you defend your digital workplace with security and DLP for every browser and essential desktop apps like Microsoft Teams, Slack, Asana, and Notion. Protect against compromise and prevent data loss via the web with Seraphic.
CIO

Experts advise on how to build a successful hybrid work security strategy

Take steps to improve the overall security posture by reducing the attack surface, increasing awareness and visibility, while driving a seamless user experience for the hybrid workforce
Secure collaboration: Adopt an approach that balances people and technology
CIO

Secure collaboration: Adopt an approach that balances people and technology

Balancing security and seamless collaboration has always been a challenge. Industry influencers highlight key considerations to assure secure experiences for workers in this crowd-sourced article.
Criminals Are Flocking to a Malicious Generative AI Tool
GovInfoSecurity

Criminals Are Flocking to a Malicious Generative AI Tool

Cybercriminals are using an evil twin of OpenAI's generative artificial intelligence tool Chat GPT. It's called FraudGPT, it's available on criminal forums, and it