How to mitigate the threat of deepfakes to enterprise organizations

How to mitigate the threat of deepfakes to enterprise organizations

How to mitigate the threat of deepfakes to enterprise organizations | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

How Shenal built a career in cybersecurity during an economic crisis

How Shenal built a career in cybersecurity during an economic crisis

We are proud of all of our students, past and present, at Cisco Networking Academy— wherever they are on their learning and career journeys. This blog was written by Shenal, a Networking Academy alum from Sri Lanka. Shenal’s story exemplifies the best of what our program and partnerships offer to empower all people with career possibilities. Having lived through a civil war, government turmoil and now the biggest financial crisis to face Sri Lanka, Shenal…

Read More

Healthcare workers remain on the front line: Now against cyber threats

Healthcare workers remain on the front line: Now against cyber threats

Healthcare workers remain on the front line: Now against cyber threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Security magazine opens up nominations for Top Cybersecurity Leaders

Security magazine opens up nominations for Top Cybersecurity Leaders

Security magazine opens up nominations for top cybersecurity leaders | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Human-Machine Interactions of the Future: Unpopular Opinions [Part 2]

Human-Machine Interactions of the Future: Unpopular Opinions [Part 2]

This is part 2 of a 3-part blog series on a Cisco futurist’s perspectives on some buzzy terms and technology trends. At Cisco, I’m responsible for looking at the future of human-machine interaction, and there are a ton of buzzy terms and trends being bandied about. Internally, I’ve fielded questions that range from NFTs and crypto, to the future of the Internet. Through that process, I’ve developed some informed but somewhat divergent perspectives. If you…

Read More

Storytelling: A CISO’s superpower against cybersecurity indifference

Storytelling: A CISO’s superpower against cybersecurity indifference

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here. The popularity of storytelling is astounding. It is rare to find a TED session without some expert expounding on the miraculous power of storytelling to give us influential superpowers, and YouTube is awash with storytelling tips and techniques. Most of these lectures, however, focus on improving main-stage presentations or enhancing the effectiveness of marketing…

Read More

Iran and Cybersecurity: What Technologists Need to Know

Iran and Cybersecurity: What Technologists Need to Know

Over the past three months, authorities have issued warnings about connections between various Iranian threat groups and several significant cybersecurity incidents, including multiple ransomware attacks and a sophisticated social-engineering scheme targeting various groups and individuals. While not at the same level as Russia and China, Iran’s cyber capabilities have increased and improved over the years. Threat groups associated with the country’s government have demonstrated the ability to conduct destructive operations as well as cyber-espionage campaigns….

Read More

How Cloud-Based Services Minimize the Impact of Incident Recovery

How Cloud-Based Services Minimize the Impact of Incident Recovery

Few organizations are able to continue operating after being hit by ransomware, let alone be able to quickly get services back online. Those few who can are likely assisted by cloud-based services as those systems tend to remain unaffected. By Jeff Chan, Technical Advisor, MOXFIVE Recent data shows that nearly 70% of organizations now host more than half of their workloads in the cloud, with overall cloud adoption growing 25% in the past year. With…

Read More

NCSC: UK Organizations Can Learn from Ukraine’s Impressive Cyber Defenses

NCSC: UK Organizations Can Learn from Ukraine’s Impressive Cyber Defenses

The Russia–Ukraine conflict has facilitated the “most sustained and intensive cyber campaign on record,” according to the National Cyber Security Centre (NCSC)’s CEO, Lindy Cameron, speaking in a keynote address during the Chatham House security and defence conference 2022. Cameron noted that both Ukraine and Russia have undertaken significant cyber operations in conjunction with their military efforts. In particular, Russia has launched “a series of major cyber-attacks in support of their illegal invasion in February.” These…

Read More

How CIOs can help reduce supply chain anxieties

How CIOs can help reduce supply chain anxieties

Many view today’s supply chains as true marvels of modern existence — push a button and a desired object is delivered to one’s doorstep. Others see modern supply chains disrupting local economies and damaging the environment. Massively complex, interdependent, and subject to disruptions, supply chains were, for the most part just a few years ago, the purview of midlevel executives operating out of sight of newsrooms and boardrooms. The pandemic, escalating geopolitical tensions, cyberattacks, and…

Read More
1 2,742 2,743 2,744 2,745 2,746 4,178