73% of airline passengers interested in biometrics replacing passports

73% of airline passengers interested in biometrics replacing passports

73% of airline passengers interested in biometrics replacing passports | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

#IRISSCON: Understanding the Reality of Cyber Threats to Improve Defenses

#IRISSCON: Understanding the Reality of Cyber Threats to Improve Defenses

Understanding the true nature of cyber-threats is critical in enabling organizations to protect themselves, according to Ciaran Martin, Founding CEO of the National Cyber Security Centre and Professor, University of Oxford.  During a session at IRISSCON 2021, Martin said it is important to be more realistic about the true threat cyber-attacks pose to society. For example, he had recently re-watched the classic movie WarGames, which “set a tone about the catastrophization of cybersecurity in a way that…

Read More

Are your critical IT assets safe from cyberattacks?

Are your critical IT assets safe from cyberattacks?

Are your critical IT assets safe from cyberattacks? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Digital Transformation Needs to (Re)Start with Security

Digital Transformation Needs to (Re)Start with Security

In life, regret tends to take on many shapes and forms. We often do not heed the guidance of the common anecdotes we hear throughout our days and years. From “look before you leap” to “an apple a day keeps the doctor away” – we take these sayings in stride, especially when we cannot necessarily provide proof of their veracity! One particular trope that may incite ire, frustration, or regret when applied to enterprise security…

Read More

Consumers like the benefits of online shopping despite the security risks

Consumers like the benefits of online shopping despite the security risks

Only 25% of consumers surveyed by NTT Application Security said they’d take their online business elsewhere following a data breach. Image: Getty Images/iStockphoto Online shopping has proven to be a quick and convenient way to buy virtually anything. And it’s been a lifesaver during the pandemic when we couldn’t go out to pick up groceries, food, and other essential items. But like any website, retail sites can be vulnerable to data breaches and security flaws….

Read More

Improving Security Operations with Intelligence-driven XDR

Improving Security Operations with Intelligence-driven XDR

Enterprises are increasingly adopting more complex security architectures that include multiple layers of protection to empower their security team and keep up with ever-increasing advanced threats. While this approach can help protect against sophisticated attacks, it also makes it difficult to correlate events across different components of the architecture. As such, enterprises need to simplify their security architecture so they can gain better visibility into what’s going on at each level within their environment. According…

Read More

The UK pushes for better supply chain cybersecurity

The UK pushes for better supply chain cybersecurity

If the UK Government gets its way, IT service vendors and other cloud-based service providers may soon be required to adopt new measures to strengthen their cybersecurity, amid rising concerns about supply chain risks. The Department for Digital, Culture, Media and Sport (DCMS) has floated plans to make mandatory compliance with the National Cyber Security Centre’s Cyber Assessment Framework, which provides guidance for organisations responsible for vitally important services and activities. In a press release,…

Read More

Housing First Rome, a unique partnership to end homelessness in Rome – Cisco Blogs

Housing First Rome, a unique partnership to end homelessness in Rome – Cisco Blogs

For over 35 years, “Mario” had put his heart into his job as a waiter — sometimes working up to 14 hours daily — before quitting to run his own bar. However, when the Covid-19 pandemic hit Europe, it struck Italy particularly hard. On March 9, 2020, Mario closed his bar after the government ordered all non-essential businesses to shutter. Without a job or income, he ended up on the street. As a result of…

Read More

The rising tide of cyber insurance premiums in the age of ransomware

The rising tide of cyber insurance premiums in the age of ransomware

The rising tide of cyber insurance premiums in the age of ransomware | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Talking Healthcare with a Team of CX Healthcare Experts – Cisco Blogs

Talking Healthcare with a Team of CX Healthcare Experts – Cisco Blogs

The pandemic has accelerated the pace and scale of digital transformation in healthcare. From delivery of care to security to clinical collaboration, technology is at the heart of today’s modern healthcare organization. For the CX Americas Healthcare Practice, it’s about helping healthcare customers leverage Cisco technology to increase business value, remove burdens and move healthcare forward, faster. Applying strengths, improving outcomes Health systems face several challenges, including mountains of technical debt, staffing issues and resource…

Read More
1 3,387 3,388 3,389 3,390 3,391 4,015