The Changing Profile of the CISO: New Roles, New Demands, New Skills

The Changing Profile of the CISO: New Roles, New Demands, New Skills

The CISO’s role is never static. Over the last two decades, it has evolved beyond technical IT security. CISOs are now central to their organization when it comes to risk, compliance and governance. And this comes at a time when businesses are undergoing rapid change in the face of changing threats. In the past, the CISO or head of IT security has been an inward-facing role, ensuring compliance and keeping data secure. But that has…

Read More

How Cybersecurity Leads to Improved Sustainability – Cisco Blogs

How Cybersecurity Leads to Improved Sustainability – Cisco Blogs

After managing the sudden switch to remote work in 2020, organizations are making a more permanent transition into the flexible hybrid workforce. The Federal Bureau of Investigation (FBI) found that cybersecurity attacks rose by 3-4 times from the transition to remote work in 2020. In addition, experts predict that ransomware will cost the world up to $20 billion in 2021 and is expected to be a greater concern with the hybrid work model. As a…

Read More

Apache Log4j: Mitigating risks

Apache Log4j: Mitigating risks

Apache Log4j: Mitigating risks Risk Management Explore tactical measures and strategic guidance to mitigate ongoing risks caused by Apache Log4j (Log4Shell). By: William Malik December 23, 2021 Read time:  ( words) Apache Log4j (Log4Shell) poses serious challenges for IT teams. In this article, I’ll discuss various tactical measures to navigate the current situation and provide strategic guidance for what to do after the immediate crisis abates. The Problem Log4j is a very useful tool incorporated…

Read More

Examining Log4j Vulnerabilities in Connected Cars and Charging Stations

Examining Log4j Vulnerabilities in Connected Cars and Charging Stations

Evidence of attacks using the Log4j vulnerability was also shown in a test that triggered a bug on a Tesla car. For this case, the source does not provide much information on where it was actually executed. Nevertheless, this means that the exploitation of the vulnerability could still have an impact on the user’s privacy and the general security of the car because a back-end compromise could allow attackers to push actions to the car…

Read More

At Stryve Secure Sustainability Is an Employee Affair

At Stryve Secure Sustainability Is an Employee Affair

“Ultimately, the effort to achieve zero-carbon emissions is about resources and humans. But it’s also about human resources. Climate change is the most important issue we face, but even from a selfish business standpoint, sustainability makes sense and will increasingly be a differentiator not only for customers, but also for employees who will demand that employers do the right thing.” — Andrew Tobin, CEO of Stryve Secure Based in Carlow, Ireland, Stryve Secure serves as…

Read More

How Analytics Supports Cyber Hygiene Across the Enterprise

How Analytics Supports Cyber Hygiene Across the Enterprise

The foundation for creating and maintaining good cyber hygiene is analytics. Think of it this way. Analytics provides the information you need to operate hygienically. Analytics is about maintaining your ability to discover relevant data and making sure endpoints are delivering the right kind of reporting when queried. Analytics provides the numbers and hard data needed to measure network performance. This information is equally critical for operations and security. Cyber hygiene creates a process to…

Read More

Accelerating business through collaboration

Accelerating business through collaboration

Being able to collaborate with colleagues online has been essential for businesses to survive during the COVID pandemic. But the truth is, it’s essential to every business, pandemic or not.  As many businesses know, collaboration tools don’t always do what they say on the box; what sounds good on a spec sheet doesn’t always translate to real-world collaboration that everyone finds easy to use.  A 2019 study by Quadrant Strategies found that while 84% of…

Read More

Cyber Hygiene, Analytics, and the User Experience

Cyber Hygiene, Analytics, and the User Experience

There’s already been a lot written about the persistent tension between operations and security. The security team’s mission is protecting the business from malicious activity, and that sometimes means locking systems down. The operations team’s mission is to maximize the business’s ability to do business on their IT systems, including managing software and configurations.  Then, of course, there is the user experience. Have the security tooling and other changes consumed so many system resources that…

Read More

Five ways to make the future of work more human

Five ways to make the future of work more human

It is the question on every executive’s mind: is pushing for return to office the right thing to do? Will productivity drop if people keep working from home?  In fact, 80% of Australian managers surveyed by CIO.com in November 2021 said that the shift to working from home had created a more positive view of remote work policies within their company and was now informing how they planned for office space, tech staffing and overall…

Read More

The tech behind the future of work

The tech behind the future of work

It’s hard to believe that just a couple of years ago, video calls were mainly something people headed to a dedicated meeting room for. Now, for many of us, it’s every meeting, every day, on any of our devices. Although the world has jumped on video meetings at record speed, anyone who has sat on back-to-back video meetings all day knows that they’re not the silver bullet. Google recently worked with Economist Impact to survey…

Read More
1 3,381 3,382 3,383 3,384 3,385 4,364