Tap into connection points between security and privacy

Tap into connection points between security and privacy

Data privacy and information security are both critical components of building customer trust for organizations. Privacy protects our personal data and empowers us to control its use, while security shields information against unauthorized access and threats. Balancing these needs is key, like finding the sweet spot between convenience and robust protection. In the face of challenges posed by emerging technologies, evolving regulations and the escalating volume of data, privacy and security teams often find themselves…

Read More

Jorge Mario Ochoa | Top Cybersecurity Leaders 2024

Jorge Mario Ochoa | Top Cybersecurity Leaders 2024

Learning is a lifelong process and is something Jorge Mario Ochoa has certainly taken to heart. The cybersecurity leader complements his knowledge with master’s degrees in seven disciplines including leadership, business administration, project management, talent management, big data and data analysis, cybersecurity, artificial intelligence and deep learning, as well as a Ph.D. in psychology. Jorge Mario considers a well-rounded education an important tool for cybersecurity professionals. “I am a firm advocate for education and collaboration,”…

Read More

Balancing data privacy and security in the age of AI-powered defenses

Balancing data privacy and security in the age of AI-powered defenses

Cyber threats are always evolving. Not only has artificial intelligence (AI) lowered the bar required to launch an attack, but adversaries are also using the technology to enhance the speed and sophistication of their tactics — through methods like code generation, password cracking, social engineering, phishing attempts and more. For example, hackers can use generative AI to build convincing profiles on social media platforms, making it easier for hackers to impersonate individuals or create fake…

Read More

Today’s SIEM data challenges require data decoupling

Today’s SIEM data challenges require data decoupling

Today’s SIEM data challenges require data decoupling | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Unlocking Industrial Data: The EU Data Act

Unlocking Industrial Data: The EU Data Act

On November 27, the European Council adopted the EU Data Act. Part of the larger EU Data Strategy to infuse competition and drive more data-driven innovation within the region, the Data Act will make data generated by connected devices and related services (industrial data) accessible to EU consumers and companies. Rules and regulations around data governance are not new. There are already laws in place to protect personal or classified data and to open up…

Read More

Responsible AI is built on a foundation of privacy

Responsible AI is built on a foundation of privacy

Nearly 40 years ago, Cisco helped build the Internet. Today, much of the Internet is powered by Cisco technology—a testament to the trust customers, partners, and stakeholders place in Cisco to securely connect everything to make anything possible. This trust is not something we take lightly. And, when it comes to AI, we know that trust is on the line. In my role as Cisco’s chief legal officer, I oversee our privacy organization. In our…

Read More

The hidden risk within the surveillance industry

The hidden risk within the surveillance industry

The hidden risk within the surveillance industry | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

A generative AI guidebook was released for CISOs

A generative AI guidebook was released for CISOs

A generative AI guidebook was released for CISOs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2 3 4 14