Kayne McGladrey – Ask A CISSP Season 2 Episode 8
Ask A CISSP

Kayne McGladrey – Ask A CISSP Season 2 Episode 8

This week on Ask A CISSP, we have an interview with Kayne McGladrey, Field CISO at Hyperproof. In this very entertaining episode, we'll learn Kayne's amazing...
Emerging cyber threats in 2023 from AI to quantum to data poisoning
CSO Online

Emerging cyber threats in 2023 from AI to quantum to data poisoning

In cybersecurity’s never-ending cat-and-mouse game with hackers and grifters, the threats are always evolving. Here are some of the main attacks experts see as the biggest and baddest on the horizon.
Why end-to-end encryption matters
Help Net Security

Why end-to-end encryption matters

End-to-end encryption (E2EE) ensures that only two parties can access data, and helps to protect consumers and businesses from prying eyes.
The four pillars of cloud security
CSHub

The four pillars of cloud security

Exploring the cornerstones of the cloud security industry, cloud evolution and cloud migration
Universities Tap Student Talent to Support Security Operations
EdTech Magazine

Universities Tap Student Talent to Support Security Operations

Student-staffed security operations centers provide on-the-job training and valuable technology skills.
Generative AI: Cybersecurity Weapon, But Not Without Adaptable, Creative (Human) Thinkers
TechRepublic

Generative AI: Cybersecurity Weapon, But Not Without Adaptable, Creative (Human) Thinkers

Cybersecurity expert Kayne McGladrey speaks about why AI cannot do what creative people can, and the important role of generative AI in SOCs.
Tasks that bog down security teams (and what to do about them)
CSO Online

Tasks that bog down security teams (and what to do about them)

Budgetary and staffing issues are putting pressure on CISOs and other security leaders. Here are 10 tasks that typically bog cyber teams down and what some security chiefs did to solve the problems.
What is End-To-End Encryption? 7 Questions Answered
IEEE Transmitter

What is End-To-End Encryption? 7 Questions Answered

A typical smartphone user may receive hundreds of SMS messages each week. Social media services keep their users engaged by pushing dozens more direct Messaging apps and social media services offer end-to-end encryption, but many consumers don’t understand it.
Allan Interviews EVERYONE at Black Hat
The Cyber Ranch Podcast

Allan Interviews EVERYONE at Black Hat

Did you miss Black Hat this year?  Well you won't miss the great conversations that were had, as Allan captured so many good ones for this special Black Hat retrospective episode.   Did you get to attend Black Hat this year?  See if your experience was as amazing as Allan's!  This show is LIVE and untarnished.  It's the real Black Hat experience!   In this episode, Allan talks to (in alphabetical order, with timestamps):   1:02 - Dani Woolf, Founder & CEO at Audience 1st 3:06 - Daniel Blackford, Manager of Threat Research @ Proofpoint 6:48 - Dean Sysman, CEO @ Axonius 8:19 - Deepen Desai, Global CISO & Head of Security Research @ ZScaler 15:39 - G. Mark Hardy, host of the CISO Tradecraft Podcast 18:42 - Glen Pendley, CTO @ Tenable 23:54 - Kayne McGladrey, Field CISO @ Hyperproof 24:52 - Leigh Honeywell, CEO @ Tall Poppy 25:52 - Masha Sedova, CEO @ Elevate Security 28:47 - Nate Warfield, Director of Research @ Eclypsium 31:43 - Rich Berthao, Cybersecurity Leader, Planner, and Innovator 32:41 - Rob Labbé, CEO and CISO in Residence for the Mining and Metals ISAC This show captures an amazing week! Sponsored by our good friends at Seraphic Security. Seraphic helps you defend your digital workplace with security and DLP for every browser and essential desktop apps like Microsoft Teams, Slack, Asana, and Notion. Protect against compromise and prevent data loss via the web with Seraphic.
CIO

Experts advise on how to build a successful hybrid work security strategy

Take steps to improve the overall security posture by reducing the attack surface, increasing awareness and visibility, while driving a seamless user experience for the hybrid workforce
Secure collaboration: Adopt an approach that balances people and technology
CIO

Secure collaboration: Adopt an approach that balances people and technology

Balancing security and seamless collaboration has always been a challenge. Industry influencers highlight key considerations to assure secure experiences for workers in this crowd-sourced article.
Criminals Are Flocking to a Malicious Generative AI Tool
GovInfoSecurity

Criminals Are Flocking to a Malicious Generative AI Tool

Cybercriminals are using an evil twin of OpenAI's generative artificial intelligence tool Chat GPT. It's called FraudGPT, it's available on criminal forums, and it
How Discord’s Parental Controls Can Keep Kids Safe
Lifewire

How Discord’s Parental Controls Can Keep Kids Safe

Having your kids on chat apps like Discord can introduce dangers, but experts say new parental controls can help.
How Will the New National Cybersecurity Strategy Be Implemented?
Information Week

How Will the New National Cybersecurity Strategy Be Implemented?

The Biden Administration released a National Cybersecurity Strategy in March, and now, it has followed up with a comprehensive plan for implementation.
How Parents Can Use Discord’s Family Center
Parents

How Parents Can Use Discord’s Family Center

More teens are gravitating toward the social media app Discord, which just launched a new Family Center. Learn more about how that can help parents protect their kids.
Why and how CISOs should work with lawyers to address regulatory burdens
CSO Online

Why and how CISOs should work with lawyers to address regulatory burdens

As the scope of cybersecurity related regulations grows, CISOs may need to partner more closely with legal teams to understand the changing requirements.
The Biden administration’s new US Cyber Trust Mark will tell you if your IoT device is secure
Vox

The Biden administration’s new US Cyber Trust Mark will tell you if your IoT device is secure

There’s a handy new label to tell you if your gadget is easy to hack or not.
Data de-identification: Best practices in the new age of regulation
VentureBeat

Data de-identification: Best practices in the new age of regulation

The increasing importance of de-identification of PII data in an organization, third parties and applications, particularly in the cloud.
Dark Reading

Survey Findings Show Link Between Data Silos and Security Vulnerabilities

A recent survey showed a surprising correlation between those who operate their businesses with risk and compliance data in silos and those who experienced data breaches in the last 24 months.
What keeps field CISO, Kayne McGladrey, up at night?
Scott Schober

What keeps field CISO, Kayne McGladrey, up at night?

Kayne McGladrey, CISSP, is the field CISO for Hyperproof and a senior member of the IEEE. He has over two decades of experience in cybersecurity and has ser...

Understand the stories that matter.

Every week, I break down the most important updates in cybersecurity and AI law and policy. Human-written, deeply analyzed.

I don’t spam! Read the privacy policy for more info.