When asked what has changed most since Oct. 7, Chen Shmilo, CEO of Israel's 8200 Alumni Association, said "trust." Trust in leadership has changed, but trust in society and its power to be resilient has been renewed, he said. "In these darkest times, some things might even change for the better."
Generative AI facilitates on-the-job learning, empowering team members to upskill themselves as they work and ultimately strengthening an organization's overall security posture, according to Fabio Fratucello, field chief technology officer, international, at CrowdStrike.
Thousands of North Korean IT workers hid their identities to earn hundreds of millions of dollars in IT contract work from overseas companies to help finance the country's weapons development program, U.S. and South Korean agencies said. Officials said to watch for workers who are camera-shy.
To truly be effective, CISOs must understand their organization's focus and culture. "In understanding the organization and its language, you understand what matters, and then by extension that will drive your security strategy and your security focus," said Helen Rabe, CISO at the BBC.
What kinds of training do security professionals need? The biggest skills gaps are soft skills - 55%, cloud computing - 47%, security controls - 35%, coding skills and software development - both at 30%, says ISACA's State of Cybersecurity 2023 survey of more than 2,000 security leaders globally.
Cybercrime is growing exponentially. Developing a robust cybersecurity workforce is vital for enterprises to address the evolving cyber threat landscape effectively.
Decision-makers and cybersecurity leaders should drive effective defense by implementing actionable steps, empowering them to build a skilled,...
Cybersecurity learning is a critical part of any cybersecurity program. Cybersecurity professionals must
continuously upgrade their knowledge to cope with the rapid evolution of cyber threats. Organizations
need new skills to confidently deploy emerging technologies that power competitive advantage....
It used to be a stray printer on a network, but today shadow IT comes in all shapes and sizes - and poses serious security threats. Jeff Keating and Jaineesh Davda of FormAssembly discuss how to manage shadow IT and protect your critical data.
In the drive to build a more diverse workforce, security organizations are progressing in many ways, such as ensuring that required skills in job descriptions are more inclusive, said Ed Parsons of (ISC)². But he added that job recruiters need to "meet underrepresented groups where they are."
Information security is no longer confined to the tech domain, and instead must align with business outcomes, adapted to suit an organizations' risk appetite, said Matt Gordon-Smith, former CISO at Gatwick Airport. Security teams often must balance competing needs and risks.
The Irish government has proposed a number of measures to strengthen the country's top cyber agency's abilities to tackle ransomware and other cyberthreats. The National Security Strategy lays out 18 new action plans intended to augment the National Cyber Security Center's capabilities.
The threat landscape continues to deteriorate, and criminals are using new techniques and pulling off devastating attacks. Meanwhile, security leaders are struggling to fill a critical shortage of skilled talent. Rob Clyde shares how ISACA is helping defenders keep up and gain cyber maturity.
Government-imposed rules on incident reporting by organizations impacted by cyberattacks are not new – many sectors have been subjected to them for decades. What is new is that governments are introducing new, more stringent incident reporting rules that will affect a broader set of organizations.
The new...
Tell people not to click a link, pat each other on the back, and ride off into the sunset. If only security awareness training was that simple.
The discipline of security awareness training is chock-full of assumptions and misconceptions. As a side-effect, it is often felt that their programs are ineffective and...
The latest edition of the ISMG Security Report discusses how adversaries have a new favorite tactic to circumvent MFA, why vendor Akamai is an appealing target for private equity, and what the industry can do differently to attract more females to leadership roles.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.