3 essential qualities of a successful cybersecurity community forum

3 essential qualities of a successful cybersecurity community forum

There is no shortage of community forums for today’s 5.5 million cybersecurity professionals, including the Cyber Professionals Community from the Federal Cyber Workforce Management and Coordinating Working Group, the ISC2 Community, Malwarebytes Forums, the Information Security Stack Exchange and many others. These forums provide information-sharing about the latest threats and attack trends, professional development, networking opportunities and additional resources at a time when they are much needed: Two-thirds of cybersecurity professionals say they face staffing…

Read More

ISC2 Security Congress: The Rise in Nation-State Cyber Threats

ISC2 Security Congress: The Rise in Nation-State Cyber Threats

Today’s threat landscape includes nation-state actors as well as attackers looking to test their skills or turn a profit. AT ISC2 Security Conference in Las Vegas, CISA advisor and former New York Times cybersecurity journalist Nicole Perlroth took the stage to discuss what has changed over the last 10 years of cyber warfare. Her presentation was the capstone of the conference, held Oct. 13-16. Nation-state attackers look for ‘target-rich, cyber-poor’ victims Perlroth presented a timeline…

Read More

Using Cybersecurity Awareness Month to build a strong culture

Using Cybersecurity Awareness Month to build a strong culture

It’s hard to believe we’ve reached the 20th anniversary of Cybersecurity Awareness Month, and yet, here we are. Over the years, the cybersecurity landscape has shifted dramatically, and with it, the need for organizations to cultivate a strong cyber awareness culture. As threats continue to grow more and more sophisticated — spanning everything from phishing schemes to large-scale ransomware attacks — a robust awareness culture is not just beneficial but a critical line of defense…

Read More

Closing the gap between physical and cybersecurity

Closing the gap between physical and cybersecurity

With an increase in in-person work, security leaders have looked into improving their physical security solutions. This could include updating their access control measures, video surveillance or hiring additional security staff. According to the Genetec State of Physical Security Report, 33% of respondents stated that their physical security systems were on-premises and 67% were cloud or hybrid-cloud. Fifty-five percent of respondents stated that their information technology (IT) department has access to physical security data. The…

Read More

Cyber League: UK's NCSC Calls on Industry Experts to Join its Fight Against Cyber Threats

Cyber League: UK's NCSC Calls on Industry Experts to Join its Fight Against Cyber Threats

The United Kingdom’s National Cyber Security Centre is inviting members of the cybersecurity community to join its new Cyber League, which is a collective of industry experts that will work alongside the government agency to tackle security threats facing the U.K. Announced by the NCSC on Jan. 17, the Cyber League will support existing NCSC initiatives that bring together experts from the public and private sectors. This is with the aim of improving knowledge sharing…

Read More

The intersection of cybersecurity and artificial intelligence

The intersection of cybersecurity and artificial intelligence

Cybersecurity and artificial intelligence (AI) are increasingly interconnected, with AI playing a significant role in enhancing cybersecurity measures. This integration is not new, but it has evolved over time as technology advances and cyber threats become more sophisticated. During the early days of cybersecurity, traditional methods such as firewalls and antivirus software were predominant. AI concepts were present, but practical applications were limited due to computing power and AI algorithm complexity. In the late 1990s…

Read More

Going back to the basics this Cybersecurity Awareness Month

Going back to the basics this Cybersecurity Awareness Month

Going back to the basics this Cybersecurity Awareness Month | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Optimize ID verification for safe, efficient omnichannel experiences

Optimize ID verification for safe, efficient omnichannel experiences

Optimize ID verification for safe, efficient omnichannel experiences | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

October marks Cybersecurity Awareness Month

October marks Cybersecurity Awareness Month

October marks Cybersecurity Awareness Month This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message or…

Read More

Delaware develops cybersecurity education program

Delaware develops cybersecurity education program

Delaware develops cybersecurity education program | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More