News

The Biden administration’s new US Cyber Trust Mark will tell you if your IoT device is secure
Vox

The Biden administration’s new US Cyber Trust Mark will tell you if your IoT device is secure

There’s a handy new label to tell you if your gadget is easy to hack or not.
Data de-identification: Best practices in the new age of regulation
VentureBeat

Data de-identification: Best practices in the new age of regulation

The increasing importance of de-identification of PII data in an organization, third parties and applications, particularly in the cloud.
Dark Reading

Survey Findings Show Link Between Data Silos and Security Vulnerabilities

A recent survey showed a surprising correlation between those who operate their businesses with risk and compliance data in silos and those who experienced data breaches in the last 24 months.
What keeps field CISO, Kayne McGladrey, up at night?
Scott Schober

What keeps field CISO, Kayne McGladrey, up at night?

Kayne McGladrey, CISSP, is the field CISO for Hyperproof and a senior member of the IEEE. He has over two decades of experience in cybersecurity and has ser...
Managing Risk and Compliance Through a Recession
Solutions Review

Managing Risk and Compliance Through a Recession

Kayne McGladrey of Hyperproof offers a deep dive into managing risk and compliance through an economic recession.
Hack me if you can
American Banker

Hack me if you can

To combat cybercriminals, banks and credit unions turn to white-hat hackers to uncover system vulnerabilities. But what motivates these computer whizzes can be surprising.
The Truth Behind Automating Compliance Controls
EM360Tech

The Truth Behind Automating Compliance Controls

In this episode of the EM360 Podcast, Richard Stiennon speaks to Kayne McGladery, Field CISO at Hyperproof to explore automating compliance controls.
ISACA Podcast – 2023: The Year of Risk
ISACA Podcast

ISACA Podcast – 2023: The Year of Risk

A review of the events of 2022 shows that 2023 will not be the year of dire new cyber attacks waged by hoodie-wearing cyber criminals or office-bound nation-state APTs. Instead, 2023 will be when multiple regulatory bodies express their mounting frustration with public and private companies' collective inability to reduce the volume and impact of prior cyber attacks.
ISACA Now Blog 2022 Three Key Predictions for 2023 The Year of Risk
ISACA

ISACA Now Blog 2022 Three Key Predictions for 2023 The Year of Risk

The rise in importance of internal risk assessments is among the key trends that could shape the risk landscape in 2023.
The Risks of 5G Security
TechRepublic

The Risks of 5G Security

Unless you've been living under a rock for the past decade, you’ve probably heard of 5G telecommunications. But what is it?
CyberWire Daily – Updates on the hybrid war, and on the
CyberWire Daily

CyberWire Daily – Updates on the hybrid war, and on the

Updates on the hybrid war, and on the incidents at the Royal Mail, the FAA, and the Guardian. Royal ransomware exploits Citrix vulnerability. CISA’s annual report is out. by N2K Networks on Podcast Addict. GitHub disables NoName accounts. Russia dismisses reports of cyberespionage attempts against US National Laboratories. The Royal Mail cyber incident is now identified as ransomware attack. An update on the NOTAM issues that interfered with civil aviation. A Citrix vulnerability is exploited by ransomware group. CISA publishes its annual report.
Innovation Is The Key To The Need For New Approaches To Connectivity 
Security Informed

Innovation Is The Key To The Need For New Approaches To Connectivity 

Connectivity is literally the difference between products operating individually and those combined into a more powerful system. Many of the devices that connect today’s security products...
It’s Time to Regard Cybersecurity as Human Safety
IndustryWeek

It’s Time to Regard Cybersecurity as Human Safety

Tabletop exercises with senior leaders, evaluating employee reports of risk and engaging training programs should be part of plants’ regular safety procedures.
Plugging the gaps: Can the metaverse be a safer place than today’s internet?
The Financial Express

Plugging the gaps: Can the metaverse be a safer place than today’s internet?

Security has to be built into the platforms right from the start
Finding a long-term solution to curb Cybercrimes in the digital sphere: A Global Perspective
DotConnectAfrica

Finding a long-term solution to curb Cybercrimes in the digital sphere: A Global Perspective

This was the 7th series of WebForum which was in line with this year’s International CyberSecurity Awareness Month theme "See you in cyber - #becybersmart” h...
Cloud, 5G to be decisive tech trends in 2023: Study
Geospatial World

Cloud, 5G to be decisive tech trends in 2023: Study

Cloud computing & 5G will have most crucial impact in 2023, followed by Metaverse, Electric Vehicles (EVs) & Industrial Internet of Things (IIoT).
Best practices for cryptocurrency firms and digital currency firms managing money
Security Magazine

Best practices for cryptocurrency firms and digital currency firms managing money

Cryptocurrency firms are not immune from regulatory and legal obligations. Three best practices, however, can help firms ensure compliance and minimize regulatory risks.
4 Stakeholders Critical to Addressing the Cybersecurity Workforce Gap
Dark Reading

4 Stakeholders Critical to Addressing the Cybersecurity Workforce Gap

A cross-disciplinary effort of change is needed to attract new professionals in the coming decade.
What Thoma Bravo’s latest acquisition reveals about identity management
VentureBeat

What Thoma Bravo’s latest acquisition reveals about identity management

Thoma Bravo’s acquisition of ForgeRock points to a larger trend of identity management across enterprise security teams.
Banks can leverage automation, regulation for cyberattack prevention
FinAi News

Banks can leverage automation, regulation for cyberattack prevention

Financial institutions can avoid becoming the next victim of a costly cyberattack by leveraging automation and existing legislation. Automation can help to mitigate risk when handling personal client information by storing records efficiently and securely, Kayne McGladrey, senior member of professional association for electronics engineers IEEE and field chief information security officer at Hyperproof, told […]