News

Best practices for cryptocurrency firms and digital currency firms managing money
Security Magazine

Best practices for cryptocurrency firms and digital currency firms managing money

Cryptocurrency firms are not immune from regulatory and legal obligations. Three best practices, however, can help firms ensure compliance and minimize regulatory risks.
4 Stakeholders Critical to Addressing the Cybersecurity Workforce Gap
Dark Reading

4 Stakeholders Critical to Addressing the Cybersecurity Workforce Gap

A cross-disciplinary effort of change is needed to attract new professionals in the coming decade.
What Thoma Bravo’s latest acquisition reveals about identity management
VentureBeat

What Thoma Bravo’s latest acquisition reveals about identity management

Thoma Bravo’s acquisition of ForgeRock points to a larger trend of identity management across enterprise security teams.
Banks can leverage automation, regulation for cyberattack prevention
FinAi News

Banks can leverage automation, regulation for cyberattack prevention

Financial institutions can avoid becoming the next victim of a costly cyberattack by leveraging automation and existing legislation. Automation can help to mitigate risk when handling personal client information by storing records efficiently and securely, Kayne McGladrey, senior member of professional association for electronics engineers IEEE and field chief information security officer at Hyperproof, told […]
Noberus Amps Its Tactics: How IT Leaders Can Keep Up with Evolving Ransomware
InformationWeek

Noberus Amps Its Tactics: How IT Leaders Can Keep Up with Evolving Ransomware

Ransomware descended from the tool used in the Colonial Pipeline attack in 2021 has been leveraging new tools, tactics, and procedures. What does this evolving threat mean for its potential targets?
The tools and strategies schools need for ransomware defense
Cybersecurity Dive

The tools and strategies schools need for ransomware defense

CISOs empathize with the unenviable position schools are in as they confront ransomware. The right capabilities could make a big difference.
Is there an expiry date for connected vehicle software support?
Automotive World

Is there an expiry date for connected vehicle software support?

The IEEE flags some unanswered questions that need to be addressed in the move to connected vehicles. By Megan Lampinen
The truth about quantum risk cryptography and being ‘quantum safe’
VentureBeat

The truth about quantum risk cryptography and being ‘quantum safe’

With experts suggesting that quantum computers will decrypt public key algorithms by 2030, quantum risk cryptography is becoming vital.
What you need to land a six-figure cybersecurity job
Fortune

What you need to land a six-figure cybersecurity job

Earning a master's degree in cybersecurity can be one path to earning a six-figure salary, but trainings and certifications can also get you there.
The CISO Experience
Infoseclive

The CISO Experience

Save the date for a very special “The CISO Experience” hosted by myself with our star guest Kayne McGladrey taking a Macro Economic view of the industry. Kayne...
Cybersecurity hiring remains red-hot—the industry to surpass $400 billion market size by 2027
Fortune

Cybersecurity hiring remains red-hot—the industry to surpass $400 billion market size by 2027

The cybersecurity market continues to grow as the number of cyber attacks increases every year and talent numbers fall short.
Exploring the Advantages of Deploying DPUs in the Data Center
CIO

Exploring the Advantages of Deploying DPUs in the Data Center

Members of the Foundry/IDG Influencer Network weigh in on this increasingly important technology.
An Interview with Kayne McGladrey
Onalytica

An Interview with Kayne McGladrey

Kayne has recently featured in Onalytica's Who is Who in Cybersecurity report.
Vigilance and Planning: Experts Share Their IT and Data Security Strategies
CSO Online

Vigilance and Planning: Experts Share Their IT and Data Security Strategies

IT and security leaders take proactive approaches to secure and protect IT environments amid the evolving threat landscape.
Top 4 IoT data privacy issues developers must address
TechTarget

Top 4 IoT data privacy issues developers must address

API permissions, AI data set bias, device pervasiveness and physical access are all considerations IoT developers should add to the design process.
Denial of Service Attacks Expected To Get Bigger, Nastier
DataCenterKnowledge

Denial of Service Attacks Expected To Get Bigger, Nastier

And we thought 2021 was already bad enough.
Security in 2022 – Ransomware, APT groups and crypto exchanges pose key challenges
Security Magazine

Security in 2022 – Ransomware, APT groups and crypto exchanges pose key challenges

Heading into 2022, business leaders and security professionals have many challenges to deal with. For many, the year ahead will feel like the movie “Groundhog Day,” as most businesses and organizations continue to work to find a proportional response to ransomware.
Thinkers360 Predictions Series – 2022 Predictions for Cybersecurity
Thinkers360

Thinkers360 Predictions Series – 2022 Predictions for Cybersecurity

Thinkers360 2022 Predictions for Cybersecurity are part of a series providing actionable insights for business and technology executives
Watch: Supply Chain Congestion: A Golden Opportunity for Hackers
SupplyChainBrain

Watch: Supply Chain Congestion: A Golden Opportunity for Hackers

Kayne McGladrey, senior member of IEEE, offers valuable tips on how supply chains can shore up their cybersecurity at a time when threats from hackers are greater than ever. Global supply chains have been under intense strain in recent months, a situation that has been made even worse by the growth of cyber attacks, especially in the form of ransomware. The transportation sector, which has been largely deregulated, needs to adopt recommendations by industry and government organizations for implementing measures that they might have overlooked . . .
Reduce the risk of cyber attacks with frameworks, assessments
TechTarget

Reduce the risk of cyber attacks with frameworks, assessments

To reduce the chances of falling victim to large-scale cyber attacks, organizations must identify and mitigate threats. Learn why a framework is necessary.