There are three foundational pillars to fostering a cyber-engaged workforce: employee engagement, executive leadership engagement and peer network engagement.
Three in four organizations are currently utilizing a hybrid work model. Employers and employees alike feel this is the best path moving forward. However, only roughly one in five companies (21%) are fully confident their infrastructure security can support long-term remote work.
Devin Ertel has been appointed Chief Information Security Officer (CISO) at Menlo Security, where he will spearhead global efforts to reduce the company’s risk and security exposure.
While forensic tools are potent weapons in the cyber world, on their own, they’re not enough to overcome the challenge of data sets growing in complexity and volume. Enter artificial intelligence.
The Cybersecurity and Infrastructure Security Agency (CISA) released the Cloud Security Technical Reference Architecture (TRA) and Zero Trust Maturity Model for public comment.
Microsoft is currently investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. The exploitation of this vulnerability may allow a remote attacker to take control of an affected system. In addition, this vulnerability has been detected in exploits in the wild.
How CISOs approach technologies and hiring decisions will go a long way in determining how their security posture evolves this year and beyond. There’s an important balance to strike between the two, and you can’t determine the right mix without taking a step back to understand the business itself.
Many security teams are still playing catch up on the risks introduced by technologies that were rapidly implemented and poorly vetted during the pandemic, while also being forced to stretch resources to counter increasingly frequent sophisticated attacks. As we edge closer to the reality of hybrid work, it’s critical that security teams begin rigorously preparing.
The Securities and Exchange Commission (SEC) has sanctioned eight financial services firms for cybersecurity failures that resulted in email account takeovers exposing the personal information of thousands of customers and clients at each firm.