News

What is End-To-End Encryption? 7 Questions Answered
IEEE Transmitter

What is End-To-End Encryption? 7 Questions Answered

A typical smartphone user may receive hundreds of SMS messages each week. Social media services keep their users engaged by pushing dozens more direct Messaging apps and social media services offer end-to-end encryption, but many consumers don’t understand it.
Allan Interviews EVERYONE at Black Hat
The Cyber Ranch Podcast

Allan Interviews EVERYONE at Black Hat

Did you miss Black Hat this year?  Well you won't miss the great conversations that were had, as Allan captured so many good ones for this special Black Hat retrospective episode.   Did you get to attend Black Hat this year?  See if your experience was as amazing as Allan's!  This show is LIVE and untarnished.  It's the real Black Hat experience!   In this episode, Allan talks to (in alphabetical order, with timestamps):   1:02 - Dani Woolf, Founder & CEO at Audience 1st 3:06 - Daniel Blackford, Manager of Threat Research @ Proofpoint 6:48 - Dean Sysman, CEO @ Axonius 8:19 - Deepen Desai, Global CISO & Head of Security Research @ ZScaler 15:39 - G. Mark Hardy, host of the CISO Tradecraft Podcast 18:42 - Glen Pendley, CTO @ Tenable 23:54 - Kayne McGladrey, Field CISO @ Hyperproof 24:52 - Leigh Honeywell, CEO @ Tall Poppy 25:52 - Masha Sedova, CEO @ Elevate Security 28:47 - Nate Warfield, Director of Research @ Eclypsium 31:43 - Rich Berthao, Cybersecurity Leader, Planner, and Innovator 32:41 - Rob Labbé, CEO and CISO in Residence for the Mining and Metals ISAC This show captures an amazing week! Sponsored by our good friends at Seraphic Security. Seraphic helps you defend your digital workplace with security and DLP for every browser and essential desktop apps like Microsoft Teams, Slack, Asana, and Notion. Protect against compromise and prevent data loss via the web with Seraphic.
CIO

Experts advise on how to build a successful hybrid work security strategy

Take steps to improve the overall security posture by reducing the attack surface, increasing awareness and visibility, while driving a seamless user experience for the hybrid workforce
Secure collaboration: Adopt an approach that balances people and technology
CIO

Secure collaboration: Adopt an approach that balances people and technology

Balancing security and seamless collaboration has always been a challenge. Industry influencers highlight key considerations to assure secure experiences for workers in this crowd-sourced article.
Criminals Are Flocking to a Malicious Generative AI Tool
GovInfoSecurity

Criminals Are Flocking to a Malicious Generative AI Tool

Cybercriminals are using an evil twin of OpenAI's generative artificial intelligence tool Chat GPT. It's called FraudGPT, it's available on criminal forums, and it
How Discord’s Parental Controls Can Keep Kids Safe
Lifewire

How Discord’s Parental Controls Can Keep Kids Safe

Having your kids on chat apps like Discord can introduce dangers, but experts say new parental controls can help.
How Will the New National Cybersecurity Strategy Be Implemented?
Information Week

How Will the New National Cybersecurity Strategy Be Implemented?

The Biden Administration released a National Cybersecurity Strategy in March, and now, it has followed up with a comprehensive plan for implementation.
How Parents Can Use Discord’s Family Center
Parents

How Parents Can Use Discord’s Family Center

More teens are gravitating toward the social media app Discord, which just launched a new Family Center. Learn more about how that can help parents protect their kids.
Why and how CISOs should work with lawyers to address regulatory burdens
CSO Online

Why and how CISOs should work with lawyers to address regulatory burdens

As the scope of cybersecurity related regulations grows, CISOs may need to partner more closely with legal teams to understand the changing requirements.
The Biden administration’s new US Cyber Trust Mark will tell you if your IoT device is secure
Vox

The Biden administration’s new US Cyber Trust Mark will tell you if your IoT device is secure

There’s a handy new label to tell you if your gadget is easy to hack or not.
Data de-identification: Best practices in the new age of regulation
VentureBeat

Data de-identification: Best practices in the new age of regulation

The increasing importance of de-identification of PII data in an organization, third parties and applications, particularly in the cloud.
Dark Reading

Survey Findings Show Link Between Data Silos and Security Vulnerabilities

A recent survey showed a surprising correlation between those who operate their businesses with risk and compliance data in silos and those who experienced data breaches in the last 24 months.
What keeps field CISO, Kayne McGladrey, up at night?
Scott Schober

What keeps field CISO, Kayne McGladrey, up at night?

Kayne McGladrey, CISSP, is the field CISO for Hyperproof and a senior member of the IEEE. He has over two decades of experience in cybersecurity and has ser...
Managing Risk and Compliance Through a Recession
Solutions Review

Managing Risk and Compliance Through a Recession

Kayne McGladrey of Hyperproof offers a deep dive into managing risk and compliance through an economic recession.
Hack me if you can
American Banker

Hack me if you can

To combat cybercriminals, banks and credit unions turn to white-hat hackers to uncover system vulnerabilities. But what motivates these computer whizzes can be surprising.
The Truth Behind Automating Compliance Controls
EM360Tech

The Truth Behind Automating Compliance Controls

In this episode of the EM360 Podcast, Richard Stiennon speaks to Kayne McGladery, Field CISO at Hyperproof to explore automating compliance controls.
ISACA Podcast – 2023: The Year of Risk
ISACA Podcast

ISACA Podcast – 2023: The Year of Risk

A review of the events of 2022 shows that 2023 will not be the year of dire new cyber attacks waged by hoodie-wearing cyber criminals or office-bound nation-state APTs. Instead, 2023 will be when multiple regulatory bodies express their mounting frustration with public and private companies' collective inability to reduce the volume and impact of prior cyber attacks.
ISACA Now Blog 2022 Three Key Predictions for 2023 The Year of Risk
ISACA

ISACA Now Blog 2022 Three Key Predictions for 2023 The Year of Risk

The rise in importance of internal risk assessments is among the key trends that could shape the risk landscape in 2023.
The Risks of 5G Security
TechRepublic

The Risks of 5G Security

Unless you've been living under a rock for the past decade, you’ve probably heard of 5G telecommunications. But what is it?
CyberWire Daily – Updates on the hybrid war, and on the
CyberWire Daily

CyberWire Daily – Updates on the hybrid war, and on the

Updates on the hybrid war, and on the incidents at the Royal Mail, the FAA, and the Guardian. Royal ransomware exploits Citrix vulnerability. CISA’s annual report is out. by N2K Networks on Podcast Addict. GitHub disables NoName accounts. Russia dismisses reports of cyberespionage attempts against US National Laboratories. The Royal Mail cyber incident is now identified as ransomware attack. An update on the NOTAM issues that interfered with civil aviation. A Citrix vulnerability is exploited by ransomware group. CISA publishes its annual report.