Advertisements


CISOs: unsupported, unheard, and invisible

A study conducted among CISOs worldwide from various industries sheds light on their strategies amid a challenging threat environment, identifies obstacles from business functions, and highlights their requirements for achieving success. “Our resea.....»»

Category: securitySource:  netsecurityApr 26th, 2023

How the best CISOs leverage people and technology to become superstars

What separates superstar CISOs from the rest of the pack is that they are keenly aware of the burgeoning threat landscape and the cybersecurity skills shortage, but they don’t give in to despair. Instead, they use their existing assets to great eff.....»»

Category: securitySource:  netsecurityRelated NewsJul 31st, 2023

CISOs consider zero trust a hot security ticket

The majority of organizations are on the road to implementing a zero trust framework to increase their overall security risk posture, according to PlainID. However, only 50% said that authorization makes up their zero trust program – potentiall.....»»

Category: securitySource:  netsecurityRelated NewsJul 28th, 2023

CISOs gear up to combat the rising threat of B2B fraud

The ongoing banking and economic turmoil has opened the floodgates to fraudsters. In this Help Net Security video, ex-British Intelligence officer Alex Beavan, Head of Ethics and Anti-Corruption at Convera, discusses how fraudsters target businesses.....»»

Category: securitySource:  netsecurityRelated NewsJul 27th, 2023

SeeMetrics Security Performance Boards empowers CISOs to validate security programs

SeeMetrics launched its new Security Performance Boards. Organized by security domains, the new Security Performance Boards are a collection of out-of-the box metrics that empower security leaders to measure the performance of their technologies, pro.....»»

Category: securitySource:  netsecurityRelated NewsJul 26th, 2023

These nearly invisible organisms help clean Lake Tahoe"s water. Here"s how they do it

Plankton are not just a diabolical mastermind on a Nickelodeon show about a sponge who lives under the sea. Lake Tahoe is filled with them—the good kind......»»

Category: topSource:  physorgRelated NewsJul 24th, 2023

Designing for safety: 10 cybersecurity priorities for a zero-trust data center

Data center cybersecurity is a business decision. Here are 10 priorities for CIOs and CISOs to create an SASE strategy based on zero trust. Data center cybersecurity is a business decision. Here are 10 priorities for CIOs and CISOs to create an S.....»»

Category: topSource:  venturebeatRelated NewsJul 24th, 2023

Unproven numbers distract from the real harm of the illicit antiquities trade, says study

New research has confirmed that the commonly repeated statement that the illicit antiquities trade is the third largest illicit trade in the world is unsupported by evidence......»»

Category: topSource:  physorgRelated NewsJul 22nd, 2023

CISOs are making cybersecurity a business problem

U.S. enterprises are responding to growing cybersecurity threats by working to make the best use of tools and services to ensure business resilience, according to ISG. Enterprises face growing cybersecurity threats The report for the U.S. finds that.....»»

Category: securitySource:  netsecurityRelated NewsJul 21st, 2023

Diligent Board Reporting for IT Risk equips CISOs with third party risk scores

Diligent launched Board Reporting for IT Risk to provide CISOs and IT risk professionals with a holistic view of their organization’s risk posture. “As cyber evolves so does the risk landscape, and it becomes a matter of not whether you&#.....»»

Category: topSource:  pcmagRelated NewsJul 19th, 2023

Researchers use isotopic analysis to map territories of jaguars in Belize

How do you study a predator with both camouflage and stealth that make it virtually invisible in the forest?.....»»

Category: topSource:  physorgRelated NewsJul 18th, 2023

Exploring the ingenious science and science fiction of making things invisible

Greg Gbur chats about his book Invisibility: The History and Science of How Not to be Seen. Enlarge / H.G. Wells' The Invisible Man inspired a 1933 film. It's just one cultural example of the human fascination with invisibility......»»

Category: topSource:  arstechnicaRelated NewsJul 17th, 2023

Researchers invent trap for capturing and comparing individual bacterial cells

All hospitals battle an invisible threat: Pseudomonas aeruginosa. It is a type of bacteria that affects thousands of patients each year in intensive care units, where it can cause sepsis, pneumonia and other types of infections......»»

Category: topSource:  physorgRelated NewsJul 13th, 2023

CISO perspective on why boards don’t fully grasp cyber attack risks

Due to their distinct perspectives, board members and CISOs often have differing views on cyber attack risks. The discrepancy arises when boards need cybersecurity expertise, need help comprehending technical jargon, or when CISOs need to communicate.....»»

Category: securitySource:  netsecurityRelated NewsJul 11th, 2023

The invisible plant technology of the prehistoric Philippines

Stone tools bear microscopic evidence of ancient plant technology, according to a study published June 30, 2023 in the open-access journal PLOS ONE by Hermine Xhauflair of the University of the Philippines Diliman and colleagues......»»

Category: topSource:  marketingvoxRelated NewsJun 30th, 2023

Report highlights children as the "hidden victims" of modern slavery

Dependent children of people impacted by human trafficking and modern slavery are being left unsupported and their needs overlooked, putting families at risk of intergenerational trauma......»»

Category: topSource:  marketingvoxRelated NewsJun 27th, 2023

How cyber insurance empowers CISOs

In this Help Net Security video, Fawaz Rasheed, Field CISO at VMware, discusses how cyber insurance remains the high tide that rises ships. For organizations choosing to purchase cyber insurance, the requirements set forth towards them are beneficial.....»»

Category: securitySource:  netsecurityRelated NewsJun 27th, 2023

How to Check the Air Quality Near You

Here’s what to know about wildfire smoke and invisible pollutants, and how you can use your phone to decide whether it’s safe to spend time outside......»»

Category: gadgetSource:  wiredRelated NewsJun 21st, 2023

CYE Hyver enhancements empower organizations with real-time risk analysis module

CYE announced a new capability in its Hyver platform that calculates dynamic risk in real-time. Hyver sets a new standard for the industry that will allow CISOs to take mitigation plans to the next level by optimizing real-time data to make both shor.....»»

Category: securitySource:  netsecurityRelated NewsJun 20th, 2023

Cybersecurity culture improves despite the dark clouds of the past year

Despite a hardening economic climate, heightened global tensions and the onset of new technology making cybercrime easier, 76% of the CISOs, suggested that no material breaches had occurred and 60% said that no material cybersecurity incident had occ.....»»

Category: securitySource:  netsecurityRelated NewsJun 16th, 2023

Red teaming can be the ground truth for CISOs and execs

This year, against the backdrop of attacks on everyone from healthcare institutions and schools to financial services organizations, as well as the introduction of legislation across the UK and EU to move security up the agenda, cybersecurity has und.....»»

Category: securitySource:  netsecurityRelated NewsJun 16th, 2023