Military Career Day: A Special Invitation to Veterans

Military Career Day: A Special Invitation to Veterans

Cisco invites you to join us for a special virtual event, Military Career Day, where we’ll be helping active-duty service members, veterans, and military spouses who are seeking a career transition to the civilian workforce.   Cisco’s VETS Employee Resource Organization looks forward to hosting this year’s Military Career Day (formerly known as Veterans Career Transition Day) on Thursday October 13, 2022. The purpose of this annual event is to help military service members, veterans,…

Read More

Shadow IT: Fear it or embrace it?

Shadow IT: Fear it or embrace it?

Image: iStock/cyano66 More about Cloud It is absolutely critical that an IT department tightly controls what employees are allowed to access from and download onto their company equipment, isn’t it? Everyone knows that allowing staff unfettered access to any website they like and bringing in third-party applications into the network without restriction is a recipe for disaster. Or at least that has been the prevailing thinking in IT security for many years. But, as more…

Read More

Complying with the Egypt Financial Cybersecurity Framework

Complying with the Egypt Financial Cybersecurity Framework

Which cybersecurity framework is the best one to use for an organization?  This is one of the most frequently asked questions when embarking on the cybersecurity journey.  Often, the answer falls quite unsatisfyingly along the explanatory lines about how there is no one-size-fits-all solution, and how there are advantages and disadvantages to each.  The hardest part for the cybersecurity professional is the thought that the only way to figure it out is to study each…

Read More

CIO Guy Hadari on the management skills that set IT leaders apart

CIO Guy Hadari on the management skills that set IT leaders apart

To Guy Hadari, CIO of Biogen, the most important, but often overlooked skill for a CIO is management. “Most people consider the CIO to be a technology person, and they want to put them in a technology box, but technology should be only 20% of a CIO’s job,” says Hadari, who has been leading IT for the $15 billion biotech business since March 2021. “CIOs need to understand infrastructure, security, and business applications at a…

Read More

National Trust’s CIO on the need for sustainability storytelling

National Trust’s CIO on the need for sustainability storytelling

National Trust CIO Jon Townsend is laying down some home truths on sustainability. Five years ago, he notes that the message in the IT industry was not of reaching net zero, ESG commitments or being more sustainable, but rather of businesses becoming “bigger, better, faster.” “We need to change that conversation,” he says, “and get [sustainability] higher on the agenda.” Townsend says the COP-26 agreement in Glasgow, Scotland, last year, visible changes in weather conditions,…

Read More

How data can move the needle on supply chain

How data can move the needle on supply chain

Data-driven supply chains continues to be a hot topic, given what’s happened over the last couple of years with the pandemic, lockdowns, transportation woes, container ships held outside ports, war in Ukraine and other issues wreaking havoc. Problems caused by these events are ongoing, but if addressed from a proactive rather than reactive standpoint, there are ways to mitigate their detrimental impact, especially when the analytics and processes become clear. “What we’re seeing with clients,…

Read More

Ransomware Group Bypasses

Ransomware Group Bypasses

A notorious ransomware group has been spotted leveraging sophisticated techniques to bypass endpoint detection and response (EDR) tools. BlackByte, which the US government has said poses a serious threat to critical infrastructure, used a “Bring Your Own Driver” technique to circumvent over 1000 drivers used by commercially available EDR products, according to Sophos. The UK cybersecurity vendor explained in a new report that the group had exploited a known vulnerability, CVE-2019-16098, in Windows graphics utility…

Read More

The astronomical costs of an asset disposal program gone wrong

The astronomical costs of an asset disposal program gone wrong

Every entity should have an information technology asset disposal (ITAD) program as part of its information security process and procedure. Indeed, every time an IT asset is purchased, the eventual disposal of that asset should already be defined within an ITAD. When one doesn’t exist, data becomes exposed, compromises occur, and in many cases, fines are levied. Such was the case with Morgan Stanley Smith Barney (MSSB), which continues to feel the repercussions of their…

Read More

4 Easy Things You Can Do Today to Improve Your Cybersecurity | McAfee Blog

4 Easy Things You Can Do Today to Improve Your Cybersecurity | McAfee Blog

Happy Cybersecurity Awareness Month!   Every October, the National Cybersecurity Alliance selects a theme around which to publish extensive awareness resources and practical tips to help you improve your cybersecurity.1 This year’s theme is “It’s easy to stay safe online.” With the number of cyber threats and breaches dominating the headlines, it can seem like a Herculean task to cover all your bases; however, with just four easy habits, you can actually protect yourself against…

Read More

Map out your security career in 4 steps

Map out your security career in 4 steps

Map Out Your Security Career in 4 Steps | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2,731 2,732 2,733 2,734 2,735 4,179