#InfosecurityEurope2022: Disinformation Warfare – How Do We Tackle Fake News?

#InfosecurityEurope2022: Disinformation Warfare – How Do We Tackle Fake News?

On the third and final day of InfoSecurity Europe 2022, Ian Hill, director of cyber security at BGL Insurance, hosted a roundtable discussion on disinformation warfare, exploring the relationship between the subjective truth and objective facts in the context of fake news. The role that psychology, social media and culture play in contextualizing and interpreting information was discussed, as well as the increased need for AI-based cybersecurity techniques and technology to detect and mitigate such…

Read More

Cisco at DistribuTECH 2022

Cisco at DistribuTECH 2022

Last month Cisco joined over 14,000 attendees in Dallas for DistribuTECH, the leading annual energy transmission and distribution event for North America. It was wonderful to be back at a live event and connectwith all the colleagues and customers.    Utilities worldwide work with Cisco to modernize and digitize their business to deliver power and services globally. Events such as DistribuTECH illustrate how IT (Information Technology) and OT (Operational Technology) convergence is transforming the utility market,…

Read More

OT:ICEFALL Research from Forescout Explores Insecure-by-Design State of Operational Technology

OT:ICEFALL Research from Forescout Explores Insecure-by-Design State of Operational Technology

OT:ICEFALL Research from Forescout Explores Insecure-by-Design State of Operational Technology The latest research from Forescout’s Vedere Labs explores the state of risk management in operational technology through the lens of 56 insecure-by-design vulnerabilities. Background On June 20, Forescout’s Vedere Labs published their latest research findings into operational technology (OT) vulnerabilities titled OT:ICEFALL. This group has been examining vulnerabilities affecting OT security for a few years now and has produced notable findings including: NUCLEUS:13, NAME:WRECK, NUMBER:JACK…

Read More

Why You Need to Get on the Zero Trust Network Access Express Lane

Why You Need to Get on the Zero Trust Network Access Express Lane

Today’s work from anywhere culture, escalating ransomware, and an explosion of Internet of Things (IoT) devices are among the trends that are driving enterprises to rethink their approach to secure network access. Virtual Private Networks (VPNs) have long been the go-to method for providing remote users secure access to the corporate network. But time has shown that VPNs have serious limitations and are not the most secure option. IT leaders are rethinking their strategies and…

Read More

US passes bills to foreground national cybersecurity

US passes bills to foreground national cybersecurity

<!– US passes bills to foreground national cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Digital Transformation at UMBC – How the pandemic created an opportunity to reimagine student services

Digital Transformation at UMBC – How the pandemic created an opportunity to reimagine student services

This post was authored by Damian Doyle, Deputy CIO and Senior Associate VP for the University of Maryland, Baltimore County (UMBC).  The University of Maryland, Baltimore County (UMBC) is an R1 university located just outside of Baltimore, MD that serves a diverse student body of 14,000 undergraduate and graduate and PhD students. We are a STEM-focused institution with our largest programs in Biology, Psychology, Computer Science and Information Systems. U.S. News and World Report ranks…

Read More

How to transfer Authy to a new phone

How to transfer Authy to a new phone

Jack Wallen walks you through the steps of transferring Authy from one phone to another. Image: Miha Creative/Adobe Stock Authy is a two-factor authentication app that makes it possible for you to easily work with 2FA codes for the apps and services you use. Two-factor authentication adds a layer of security to the sites and services you use. Once you’ve added 2FA to a site, it will not only prompt you for your account credentials…

Read More

The current cybersecurity shortage and how to resolve it

The current cybersecurity shortage and how to resolve it

Image: everythingpossible/Adobe Stock The world’s largest nonprofit association of certified cybersecurity professionals, (ISC)2, estimates we’ve had a YOY increase of 7,000 cybersecurity professionals and that currently, over four million people work in cybersecurity worldwide. And yet shortages remain. The workforce gap is increasing everywhere, including the Asia-Pacific region, which at nearly 1.5 million cybersecurity professionals short, has the lowest talent gap. Elsewhere in the world, the need far outweighs the supply. What happens when companies…

Read More

Want A Thriving Workforce? Consider Hybrid Work

Want A Thriving Workforce? Consider Hybrid Work

The lines of where and how office workers conduct their daily duties are blurred. Technology and regulatory mandates have enabled, but also forced flexibility of working from home or going to the office. Is this the case now for manufacturing workers and their first line support teams? Maybe. As organizations managed through the pandemic, they were challenged to keep operations going, while prioritizing worker safety. This seemed relatively easy for office workers who could simply…

Read More

Preventing Dark Plants With Hybrid Work

Want A Thriving Workforce? Consider Hybrid Work

The lines of where and how office workers conduct their daily duties are blurred. Technology and regulatory mandates have enabled, but also forced flexibility of working from home or going to the office. Is this the case now for manufacturing workers and their first line support teams? Maybe. As organizations managed through the pandemic, they were challenged to keep operations going, while prioritizing worker safety. This seemed relatively easy for office workers who could simply…

Read More
1 2,905 2,906 2,907 2,908 2,909 4,086