As users receive more security awareness training, their ability to effectively deal with security threats increases, reveals a new study by MediaPRO, co-sponsored with Osterman Research. The report also found that boring security awareness training doesn’t make employees want to be secure.
To get buy in from the entire organization on your role as a security professional, share these basic elements of an effective cybersecurity strategy with the rest of the C-suite.
Using memes as propaganda, employing sophisticated communication networks for both planning and recruiting, making use of both fringe and private online forums and organizing militias to inspire lone wolf actors for violent action have proven to become tried-and-true tactics by extremist online communities seeking to expand their influence in recent years.
According to the Network Contagion Research Institute (NCRI) report, presented by the Rutgers Miller Center for Community Protection and Resilience, Network-Enabled Anarchy: How Militant Anarcho-Socialist Networks Use Social Media to Spread Violence Against Political Opponents and Law Enforcement, militant and extremist groups have taken to social media and online forums to plant hateful, anti-Semitic and/or revolutionary ideas in the public eye, which are often disguised with humor or through using coded language.
Government organization Enterprise Ireland put on a cybersecurity panel discussion yesterday tackling a wide range of subjects as it relates to cybersecurity, private and public sector roles and responsibilities, and even managing cybersecurity for organizations with a huge global reach operating in multiple countries.
The Information Security Forum (ISF) announced the launch of ISF Aligned Tools Suite 2020, bringing together 14 ISF tools and cross reference aids, including a rebuilt Benchmark platform and the new IRAM2 WebApp. Aligned to the latest version of the Standard of Good Practice for Information Security 2020 (SOGP 2020), the suite – which also includes Security Healthcheck, Supply Chain accelerator tools and SOGP 2020 cross-references – helps ISF Members demonstrate compliance with international standards and assure security across their external suppliers.
A ransomware attack last spring at Simon Fraser University (SFU) reportedly compromised the personal information of about 250,000 students, faculty and alumni. Information included student and employee identification numbers, full names, birthdays, course enrolments and encrypted passwords.
Why are CISOs constrained from delivering metrics at scale and why is producing good security metrics so difficult? Here, find out what the five stages of security metrics maturity are, and how you can achieve a mature security metrics program.
Following a competitive review process, CISA awarded $2,000,000 to the University of Mississippi Medical Center (UMMC) for a two-year period of performance beginning on September 30, 2020. UMMC will use REMCDP funds to build on the successes of its previous REMCDP awards.
As cybercriminals increase their attacks during the COVID-19 pandemic, Metro Health – University of Michigan Health is fighting back. Metro Health has joined an innovative partnership of cybersecurity experts working 24/7 to protect patients and employees from scams and information theft.
The Michigan Healthcare Security Operations Center launched in 2018 as the first collective of its kind in the nation. Mi|HSOC brings together leading IT security experts from Michigan Medicine, Beaumont Health, Munson Healthcare, the Michigan Health & Hospital Association and security company CyberForce|Q.
On its third day, GSX+ kicked off with a keynote address on Military & Law Enforcement Appreciation Day by General Stanley McChrystal, former commander of U.S. and International forces in Afghanistan and best-selling author of Team of Teams: New Rules of Engagement for a Complex World.