Why a CISO Needs To Speak The Language Of Business

Why a CISO Needs To Speak The Language Of Business

Dr. Eric Cole, former CISO and founder of Secure Anchor Consulting, explains how learning to communicate with business language can create a more compelling case for executive buy-in. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: https://www.youtube.com/playlist?list=PLgTfY3TXF9YKE9pUKp57pGSTaapTLpvC3 Tim Erlin: Welcome everyone to the Tripwire Cybersecurity Podcast. I’m Tim Erlin, vice president of product management and strategy at Tripwire. Today, I am joined by Dr. Eric Cole, who is a former CISO and founder of Secure Anchor Consulting. We’re going…

Read More

Government Wants Startups to Build a More Secure Nation

Government Wants Startups to Build a More Secure Nation

The government has issued a call-to-arms to the UK’s burgeoning cybersecurity startups to help it defend the country from malicious online activity. GCHQ’s National Cyber Security Centre (NCSC) used the Cheltenham Science Festival on Friday to launch NCSC for Startups. The new program will invite applications from UK startups to develop products designed to defend critical areas of the economy and society. It’s the successor to the NCSC Cyber Accelerator, a program that reportedly helped…

Read More

G7 Turns Up the Heat on Putin Over Ransomware Attacks

G7 Turns Up the Heat on Putin Over Ransomware Attacks

G7 leaders confirmed their commitment to urgently tackling ransomware on Sunday, as a senior British security chief will warn today that cyber-criminals represent a more significant threat than state-sponsored espionage. The Carbis Bay communique, published after a three-day summit of world leaders in Cornwall, singled Russia out by name — urging Vladimir Putin to “identify, disrupt and hold to account” cyber-criminals operating from the country. “We commit to work together to urgently address the escalating…

Read More

Global Police Seize Close Record Number of Fake Pharma Sites

Global Police Seize Close Record Number of Fake Pharma Sites

A global policing operation has led to the closure of over 110,000 websites and online marketplaces selling fake pharmaceuticals, according to the international organization Interpol. The organization said that Operation Pangea XIV involved law enforcement, customs and regulatory officers from 92 countries. As well as the removal of 113,020 fake sites — the largest number since the long-running operation began in 2008 — counterfeit medicines and COVID-19 testing kits were seized after raids and checks on…

Read More

Protecting the New Most Vulnerable Population – The Grandparent Scam

Protecting the New Most Vulnerable Population – The Grandparent Scam

In Part 1 of this series, we introduced the concept that the most vulnerable people on the internet are our senior population. According to the FBI, elder fraud impacts millions of American seniors every year. Figures from the United Kingdom show similar levels of criminal activity targeting seniors. Most of the elder fraud schemes are financially driven, targeting those who most likely have a secure and readily available source of income such as retirement accounts, pensions, and…

Read More

A Look at a Zero Trust Strategy for the Remote Workforce

A Look at a Zero Trust Strategy for the Remote Workforce

If you are new to the security world, it is fair to ask yourself, “Isn’t access to data and systems always conditional? Isn’t it always granted to someone who has access to the credentials (ID and password)?” True enough, but in totality, the approach to managing access encompasses a broader spectrum of privacy policies. These policies include a mix of different strategies that can be applied based on an organization’s security vulnerabilities. Conditional access is…

Read More

How COVID-19 has made us rethink our IT teams | IT Governance

How COVID-19 has made us rethink our IT teams | IT Governance

As organisations start to consider life after COVID-19, they’ll realise that it’s not as simple as putting everything back the way it was in the Before Times. That ship has sailed. There have simply been too many benefits to remote working for organisations to demand a return to office life on a full-time basis. Indeed, a Gartner survey found that 47% of organisations will give employees the choice of working remotely full-time once the pandemic…

Read More

Enterprise security: Positioning your team as a value add, not a cost center

Enterprise security: Positioning your team as a value add, not a cost center

Enterprise security: Positioning your team as a value add, not a cost center | 2021-06-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Real-time locating systems as a security tool

Real-time locating systems as a security tool

Real-time locating systems as a security tool | 2021-06-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

A loaded word: The challenge of defining active assailant protocols in PreK-12 schools

A loaded word: The challenge of defining active assailant protocols in PreK-12 schools

A loaded word: The challenge of defining active assailant protocols in PreK-12 schools | 2021-06-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More
1 2,292 2,293 2,294 2,295 2,296 2,645