Finding My Place, Part Three: Translating Military Skills to Cybersecurity Leadership

Finding My Place, Part Three: Translating Military Skills to Cybersecurity Leadership

When I left the military, I had some big misconceptions. I thought jumping into a leadership position at a big company like Cisco would be a breeze. I had already led Marines into conflict zones, so how hard could it be? But, after being turned down several times for leadership positions at several different companies, I had to rethink my strategy. It turned out that I had a lot to learn about the business world, especially the business…

Read More

Get 9 Courses on Ethical Hacking for Just $50

Get 9 Courses on Ethical Hacking for Just

TL;DR: Kickstart a lucrative ethical hacking career or protect your own business with The Complete 2024 Penetration Testing & Ethical Hacking Certification Training Bundle, now just $49.99. Ethical hackers are in high demand all over the world, in all kinds of industries. If you’re interested in pursuing this promising career path or saving money by protecting your own business, The Complete 2024 Penetration Testing & Ethical Hacking Certification Training Bundle can help. Although incident response…

Read More

Anthropic’s Generative AI Research Reveals More About How LLMs Affect Security and Bias

Anthropic’s Generative AI Research Reveals More About How LLMs Affect Security and Bias

Because large language models operate using neuron-like structures that may link many different concepts and modalities together, it can be difficult for AI developers to adjust their models to change the models’ behavior. If you don’t know what neurons connect what concepts, you won’t know which neurons to change. On May 21, Anthropic created a remarkably detailed map of the inner workings of the fine-tuned version of its Claude 3 Sonnet 3.0 model. With this…

Read More

IBM X-Force Report: Grandoreiro Malware Targets More Than 1,500 Banks in 60 Countries

IBM X-Force Report: Grandoreiro Malware Targets More Than 1,500 Banks in 60 Countries

A new report from IBM X-Force exposes changes in the Grandoreiro malware landscape. The banking trojan is now capable of targeting more than 1,500 global banks in more than 60 countries, and it has been updated with new features. Also, Grandoreiro’s targeting has become wider, as it initially only targeted Spanish-speaking countries, while recent attack campaigns targeted countries in Europe, Asia and Africa. In addition, the malware is now sending phishing emails directly from the…

Read More

A Microsoft under attack from government and tech rivals after 'preventable' hack ties executive pay to cyberthreats

A Microsoft under attack from government and tech rivals after 'preventable' hack ties executive pay to cyberthreats

Microsoft has come under fire recently from both the U.S. government and rival companies for its failure to stop a Chinese hack of its systems last summer. One change the tech giant is making in response: linking executive compensation more closely to cybersecurity. In April, a government review board described a hack of Microsoft last summer attributed to China as “preventable.” The U.S. Department of Homeland Security’s Cyber Safety Review Board pointed to “a cascade of…

Read More

What's all the buzz about Whole of State?

What's all the buzz about Whole of State?

State and local organizations provide services which are the foundation upon which our society operates.  This same foundation is at risk for cybersecurity incidents, so the federal government is providing grants via the State and Local Cybersecurity Grant Program (SLCGP) to support the cybersecurity health of city and local agencies. The SLCGP will provide $1B from FY22-25. States will administer the funds and determine a plan to implement and maintain security offerings. This program is…

Read More

Black Basta Ransomware Struck More Than 500 Organizations Worldwide

Black Basta Ransomware Struck More Than 500 Organizations Worldwide

A joint cybersecurity advisory from the Federal Bureau of Investigation, Cybersecurity and Infrastructure Security Agency, Department of Health and Human services and Multi-State Information Sharing and Analysis Center was recently released to provide more information about the Black Basta ransomware. Black Basta affiliates have targeted organizations in the U.S., Canada, Japan, U.K., Australia and New Zealand. As of May 2024, these affiliates have impacted more than 500 organizations globally and stolen data from at least…

Read More

Critical Steps to Bolster UK's Cyber Resilience: Insights for Policy Makers from Cisco’s Cyber Readiness Index

Critical Steps to Bolster UK's Cyber Resilience: Insights for Policy Makers from Cisco’s Cyber Readiness Index

Recognising the vital role digital technologies now play in the delivery of economic prosperity, public services and national security, the UK Government rightly strives to be a global leader in innovation and technology. There are many aspects that are important to meeting this goal, but it is increasingly clear that a robust and resilient approach to cybersecurity across the economy is non-negotiable. In the face of growing cybersecurity threats, the UK’s Department for Science, Innovation…

Read More

Here’s What 20 Top Cybersecurity CEOs And CTOs Were Saying At RSAC 2024

Here’s What 20 Top Cybersecurity CEOs And CTOs Were Saying At RSAC 2024

CRN spoke with the CEOs and CTOs of a number of cybersecurity companies, including Proofpoint, Palo Alto Networks, Rubrik and CrowdStrike, during RSA Conference 2024. Here’s what they had to say. While the many implications of GenAI for security continued to be discussed and debated at last week’s RSA Conference, an array of other issues were front and center—including for many CEOs and CTOs at leading cybersecurity vendors. During interviews the week before RSAC 2024…

Read More

How Can Businesses Defend Themselves Against Cyberthreats?

How Can Businesses Defend Themselves Against Cyberthreats?

Today, all businesses are at risk of cyberattack, and that risk is constantly growing. Digital transformations are resulting in more sensitive and valuable data being moved onto online systems capable of exploitation, thus increasing the profitability of a successful breach. Furthermore, launching a cyberattack is becoming more accessible. Exploit kits and malware-as-a-service offerings are getting cheaper, while open-source AI tools are making masquerading as a trusted executive and exploiting vulnerabilities easier. TechRepublic consolidated expert advice…

Read More
1 14 15 16 17 18 30