Your main users are not Spartan warriors. They are not professional security geeks. They don’t think like hackers. Elevated security measures do not come naturally to most people. They all have real jobs to do which are NOT focused on information and cybersecurity.
U.S. credit reporting agency Equifax has confirmed that an Apache Struts vulnerability exploited in the wild since March was used to breach its systems and cause possibly one of the worst leaks of highly sensitive personal and financial information.
The increasing adoption of hybrid cloud – a mix of public cloud services and privately owned data centers, already in place for 70 percent of companies on a global level – is giving rise to new security challenges and prompting CISOs to adopt different technologies to fight zero-day exploits, advanced persistent threats, and other devastating types of cybercrime.
Department of Homeland Security Acting Secretary Elaine Duke told a U.S. Chamber of Commerce cybersecurity summit today there is a need to create a sense of urgency to ease the shortage of cyber professionals.
All colleges and universities have been ramping up their cybersecurity efforts during the past decade, but where do the trained professionals to meet their needs – and those of other industries – earn their credentials? Regent University has started providing an answer to that question during the past couple of years by building a state of the art “cyber range” on its Virginia Beach campus.
Taking advantage of technology and digitization involves more than business strategy. It requires strong data governance principles which, among other things, must align the functional demands of an organization’s cybersecurity, privacy and information management teams.
Ninety-four percent of large businesses in the U.S. have a cybersecurity policy, according to the 2017 Cybersecurity Survey by Clutch, and most of them have had a policy for more than three years. U.S. enterprises are more likely to have a cybersecurity policy than most global organizations (two-thirds of which lack a formal cybersecurity policy), and policies most commonly include required security software, backups, scam detection and security incident reporting protocols.
Millions of Americans increasingly store personal information on their devices, raising privacy and security questions about state legislative efforts to require electronics manufacturers to provide all repair shops with access to source information that could compromise those devices, according to new CompTIA research.
Do you have a new job as the Chief Information Security Officer (CISO), Chief Security Officer (CSO), the Security Information Manager or something similar? Congratulations! You’ve just received a great job opportunity – one that can either be your dream job, your worst nightmare, and sometimes both simultaneously.