News

Beat common types of cyberfraud with security awareness
Search Security

Beat common types of cyberfraud with security awareness

Credential harvesting, OAuth attacks and other types of cyberfraud distributed via social engineering scams have the potential to destroy a business and its reputation. Security awareness programs can help employees spot the threat.
AI, automation emerge as critical tools for cybersecurity
CIO

AI, automation emerge as critical tools for cybersecurity

Organizations find new ways to relieve some of the burden on security teams while shoring up defenses.
7 Tips for Infosec Pros Considering a Lateral Career Move
Dark Reading

7 Tips for Infosec Pros Considering a Lateral Career Move

Looking to switch things up but not sure how to do it? Security experts share their advice for switching career paths in the industry.
Better HR security could help thwart Iranian cyberattack
TechTarget

Better HR security could help thwart Iranian cyberattack

HR departments are at great risk from Iranian cyberattacks and hackers in general. Some are adopting HR security trends to protect their departments. But HR also has a broader responsibility to help protect organizations, according to security experts.
ICS security challenges and how to overcome them
TechTarget

ICS security challenges and how to overcome them

Industrial control systems are starting to reap the benefits of industrial IoT, but as more ICSes become internet-connected, security must be addressed. IEEE member Kayne McGladrey discussed the threats to ICS security and how to start building an ICS security framework.
Four 2019 Enterprise Cyber Focal Points And The 2020 Ramifications
CSHub

Four 2019 Enterprise Cyber Focal Points And The 2020 Ramifications

2019 wasn’t a great year for cyber security. The number and scope of market solutions increased, though blue teams have been stymied by the increasing complexity and tactics of threat actors and sheer volume of data to review. Here are four predictions for the coming storm, based on events in 2019.
Ask questions about Internet-connected toys
The Jackson Sun

Ask questions about Internet-connected toys

Experts say that smart toys are particularly vulnerable to cyber attacks. Kayne McGladrey, a member of the Institute of Electrical and Electronics Engineers, said their desire to keep toy prices low means manufacturers have little incentive to add reasonable security mechanisms.
What is the California Consumer Privacy Act of 2018? Influencers in the know break down the details
CIO

What is the California Consumer Privacy Act of 2018? Influencers in the know break down the details

The California Consumer Privacy Act of 2018 is a bill intended to enhance online privacy rights and consumer protection for residents of California, United States. But the bill has national and global implications. Here’s how to prepare your organization for compliance and protect your customers.
Enterprise Cyber Security Trends and Predictions 2020
CSHub

Enterprise Cyber Security Trends and Predictions 2020

Cyber Security Hub presents its annual market report on InfoSec trends and predictions. We compare results to responses of security leaders to see if challenges or focuses have changed or shifted as the industry enters a new year.
Thinkers360 Predictions Series – 2020 Predictions for Cybersecurity
Thinkers360

Thinkers360 Predictions Series – 2020 Predictions for Cybersecurity

Thinkers360 2020 Predictions for Cybersecurity are part of a series intended to provide actionable insights for business and technology executives
CSHub

Cyber Security Digital Summit Panel Discussion: Who Is Responsible For Cyber Security In The Enterprise?

In this Cyber Security Digital Summit panel discussion with Mastercard, Pensar Development and Yum! Brands, discover why everyone within the business is responsible for Cyber Security and how to educate the enterprise on safeguarding customer data.
We Talk to Global Cybersecurity Influencer and Expert Kayne McGladrey!
MyHackerTech

We Talk to Global Cybersecurity Influencer and Expert Kayne McGladrey!

It's time for more ‘Stories from Cybersecurity’! This week we talked to Kayne McGladrey ( @kaynemcgladrey  ). Kayne is a member of the IEEE and the executive advisory board for Cyber Security Hub. He’s been published in USA Today, Reader’s Digest, Fast Company, the Philadelphia Inquirer, and many cybersecurity publications like Dark Reading, SC Magazine, and CIO Magazine.
A cybersecurity skills gap demands thinking outside the box
TechTarget

A cybersecurity skills gap demands thinking outside the box

Today's cybersecurity skills gap can't be filled using yesterday's methods. It's time to rethink how candidates are screened for open cybersecurity positions. Learn more about thinking outside the box when it comes to cybersecurity staffing.
Cyberattacks Make World Economic Forum Top 10 Global Risks For The Next Decade
CSHub

Cyberattacks Make World Economic Forum Top 10 Global Risks For The Next Decade

The World Economic Forum has identified cyberattacks as one of the top 10 global risks over the next decade. If cyber security is unable to keep pace with technological change, the impact could reach $90 trillion. Here’s what enterprise security leaders can do to overcome the challenge.
Users are the target: How employees can be the strongest line of defense
SC Media

Users are the target: How employees can be the strongest line of defense

One might think that stopping malware, phishing, and a whole host of email-borne attacks was akin to stopping rain during a hurricane or snow during a blizzard. It is ubiquitous and relentless. And despite promising advances in technology, so much malware still gets through cyberdefenses that the proverbial last line of defense, the end user, ...
CSHub

Cyber Security Digital Summit Explores Who Owns Enterprise Security

Cyber security is still viewed as an IT issue that often means infosec gets bolted on rather than bolted in to the company’s operations and culture. Join the Cyber Security Digital Summit as Kayne McGladrey and other security leaders discuss changing the perception of enterprise cyber security.
3 Ways To Prepare Now For Future Endpoint Defense
CSHub

3 Ways To Prepare Now For Future Endpoint Defense

The traditional network endpoint was isolated to desktop PCs and laptop computers that attached to the organization’s network. A dramatic increase in mobile devices, cloud and IoT has broadened the definition. Security leader Kayne McGladrey weighs in on enterprise endpoint defense tactics.
Dark Reading

4 Cybersecurity Best Practices for Electrical Engineers

Most electrical engineering firms are targeted by threat actors of opportunity because of two necessary ingredients: people and computers. These four tips will help keep you safer.
Market Report: Cutting-Edge Defense Tactics For Network Endpoints
CSHub

Market Report: Cutting-Edge Defense Tactics For Network Endpoints

In recent years, a dramatic increase in mobile devices has broadened the network endpoint definition. This Cyber Security Hub market report outlines the endpoint and attack challenge, presents 18 CISO tactics for endpoint defense, and strategies for self-assessment and security awareness.
Changing The Course Of History Means Every Month Needs To Be Cyber Security Month
CSHub

Changing The Course Of History Means Every Month Needs To Be Cyber Security Month

Winning against cyber-crime means we each need to provide actionable steps to people who don’t work in cyber security. Here are some simple steps that you can take to make a difference.