Anticipate, Respond & Adapt: Organizational Resilience

Anticipate, Respond & Adapt: Organizational Resilience

Gary Hibberd, professor of communicating cyber for Cyberfort and former head of business continuity and information security at various companies, teaches the importance of building resilience in your organization not just with technology but also with people and processes. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: https://www.youtube.com/playlist?list=PLgTfY3TXF9YKE9pUKp57pGSTaapTLpvC3 Tim Erlin: Welcome to the Tripwire Cybersecurity Podcast. I’m Tim Erlin, vice president of product management and strategy at Tripwire. Today, I am joined by Gary Hibberd, who is the professor of…

Read More

Sensitive Defense Documents Found at Bus Stop

Sensitive Defense Documents Found at Bus Stop

Classified Ministry of Defence (MoD) documents have reportedly been discovered at a bus stop in southern England, raising concerns over national security. Nearly 50 pages were found by a member of the public behind the bus stop in Kent last Tuesday and shown to the BBC. They are said to contain printed emails and PowerPoint presentations from a senior official at the MoD. These include information on the decision-making process that saw a Type 45 destroyer,…

Read More

Former Health Secretary Faces Probe Over Use of Personal Emails

Former Health Secretary Faces Probe Over Use of Personal Emails

Former health secretary Matt Hancock is facing further pressure this week after Labour called for an investigation into his alleged use of personal email to conduct official government business. Hancock was forced to resign after CCTV footage leaked last week showed the married Tory MP in a romantic embrace with an advisor in his Whitehall office, breaking social distancing guidelines. Labour deputy leader, Angela Rayner, has now called on the cabinet secretary to launch an…

Read More

Cybersecurity Challenges in the Construction Industry

Cybersecurity Challenges in the Construction Industry

Digital transformation is at the heart of every industry. There are no longer any industries that are immune to the rapid adoption of this movement. When we think of the construction industry, we may think back to an image of ironworkers sitting over a city and enjoying a lunch break on a construction beam. However, rapid digitalization has transformed the construction industry and will continue to drive change and encourage innovation. The traditional ways of conducting business brings…

Read More

Gender Diversity Challenges in the Cyber Workforce

Gender Diversity Challenges in the Cyber Workforce

Over the years, there have been many news headlines, policy reports, white papers, and corporate newsletters that have highlighted cybersecurity workforce challenges; namely, the global shortage of cybersecurity professionals. Some of the challenges involved in achieving a more desirable cyber workforce include addressing the barriers to entry for marginalized individuals, gender disparities including the gender pay gap, and employer assertions of cyber workforce shortages due to unskilled, or low-skilled, individuals interested in working in the cybersecurity…

Read More

Technology helps address student safety and behavioral health concerns

Technology helps address student safety and behavioral health concerns

Technology helps address student safety and behavioral health concerns | 2021-06-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Emergency operations center best practices for hurricane season

Emergency operations center best practices for hurricane season

Emergency operations center best practices for hurricane season | 2021-06-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

5 minutes with Tony Bai and Joe Cortese – The future of supply chain security

5 minutes with Tony Bai and Joe Cortese – The future of supply chain security

5 minutes with Tony Bai and Joe Cortese – The future of supply chain security | 2021-06-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

Why A ‘Layers and Lists’ Approach to Cybersecurity Is Doomed to Fail

Why A ‘Layers and Lists’ Approach to Cybersecurity Is Doomed to Fail

By Gary Fischer, VP Americas, XM Cyber Why is cyber-defense such an asymmetrical war? Hackers can launch a barrage of attacks on a single target and keep going until they find one overlooked weakness. Defenders, meanwhile, are often overwhelmed with alerts, unsure what to patch first and have little real visibility into the weaknesses of their ever-changing environments. In a battle between active adversaries who only need to land a single blow to win — and passive defenders…

Read More

New Report Shows Over Two Million Secrets Detected on Public GitHub in 2020 and a 20% growing trend Year-Over-Year.

New Report Shows Over Two Million Secrets Detected on Public GitHub in 2020 and a 20% growing trend Year-Over-Year.

By Jeremy Thomas, GitGuardian CEO When we started working on GitGuardian’s detection algorithm and got the first detection results, we could not believe it. We were facing a very counterintuitive reality. Secrets were actually hard coded in source code and available for all to see on public GitHub. And not just developers’ personal secrets but also corporate secrets ending up on developers’ personal repositories outside of corporate control. After scanning billions of commits each year…

Read More
1 2,268 2,269 2,270 2,271 2,272 2,643