Leadership skills for managing cybersecurity during digital transformation
In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the cybersecurity risks they have to deal with during digital transformation. The pos.....»»
Stocking stuffer idea: Tamagotchi for only $20
The Original Tamagotchi is on sale from Walmart for only $20 after a $22 discount. The popular digital pet is an excellent stocking stuffer for the holidays!.....»»
Product showcase: Securing Active Directory passwords with Specops Password Policy
Password policies are a cornerstone of cybersecurity for any organization. A good password policy ensures every end user has a strong and unique password, significantly reducing the risk of unauthorized access and data breaches. These policies not on.....»»
FBI suggests use of encrypted messaging apps while US faces huge cyberattack from China
The FBI and Cybersecurity and Infrastructure Security Agency say that Americans should use encrypted apps such as iMessage and FaceTime to be safe from foreign hackers.Image credit: Elchinator on PixabayIt's an about-face for the FBI, which has for y.....»»
65% of office workers bypass cybersecurity to boost productivity
High-risk access exists throughout the workplace, in almost every job role, proving that the time has come for organizations to re-think the way they protect their workforce, according to CyberArk. CyberArk surveyed 14,003 employees in the UK, USA, F.....»»
Leading the charge: How regenerative business leadership can improve social, environmental, and economic systems
By restoring ecosystems, empowering communities, and driving sustainable economic growth, regenerative business practices create long-term value. But these shifts demand more than strategic tweaks; they require visionary leadership capable of steerin.....»»
New research demonstrates potential of digital payments to help alleviate hunger
Could the same digital payment platforms that you use to buy a cup of coffee or make a charitable donation be used to alleviate extreme hunger around the world? That's the question a research team led by Tarek Ghani, an assistant professor of strateg.....»»
97% of adult Australians have limited skills to verify information online: Report
Australians now use social media more often than any other type of media, including TV, radio and websites. While the increased use of social media platforms present new opportunities to access and engage with information, it also introduces serious.....»»
Whitepaper: 9 traits of effective cybersecurity leaders of tomorrow
The cyber world needs your expertise. But the security leaders of tomorrow require a broad set of skills that job experience alone does not arm you with. What do today’s organizations demand? And how can you acquire the technical and soft skills th.....»»
US government, energy sector contractor hit by ransomware
ENGlobal, a Texas-based engineering and automation contractor for companies in the energy sector, has had its data encrypted by attackers. “On November 25, 2024, ENGlobal Corporation (the “Company”) became aware of a cybersecurity incident......»»
Best practices for staying cyber secure during the holidays
In this Help Net Security video, Sean Tufts, managing partner for critical infrastructure and operational technology at Optiv, discusses best practices for keeping businesses secure amidst a barrage of threats during the holiday season. Pause large c.....»»
Treat AI like a human: Redefining cybersecurity
In this Help Net Security interview, Doug Kersten, CISO of Appfire, explains how treating AI like a human can change the way cybersecurity professionals use AI tools. He discusses how this shift encourages a more collaborative approach while acknowle.....»»
Cybersecurity jobs available right now: December 3, 2024
Application Security Engineer TE Connectivity | USA | Remote – View job details As an Application Security Engineer, you will design, develop, and implement a robust Application Security program. Create and maintain application securi.....»»
Researchers develop hyper-sampling imaging to deliver ultra-high-resolution images
A research team led by Prof. Zhang Ze from the Aerospace Information Research Institute (AIR) of the Chinese Academy of Sciences has developed a hyper-sampling imaging (HSI) technology that enhances the image quality and resolution of digital imaging.....»»
Interim dollar gains, cybersecurity pains: Expert explains how financial loss from data breaches can be mitigated
Between 2005 and 2018, incidents of data breach in the United States rose by nearly eight times, according to the Identity Theft Resource Center......»»
Tip pressure might work in the moment, but customers are less likely to return
Have you ever hesitated at the register, uncomfortable as an employee watched you choose a tip? It's not just you. The rise of digital tipping systems—from point-of-sale devices held by employees to countertop screens that clearly display your sele.....»»
Study reveals women excel in effective aspects of leadership
Samantha Paustian-Underdahl, a researcher and organizational expert in the Florida State University College of Business, led a comprehensive study that challenges long-held assumptions about gender and leadership effectiveness......»»
Brief scientific literacy interventions may quash new conspiracy theories
The more time you spend on social media, the likelier you are to have come across a viral post that seems too strange to be true. Brief scientific literacy interventions, especially those that focus on critical thinking skills, may help to undermine.....»»
HomePass 2 makes managing HomeKit and Matter accessories a breeze
HomePass is a must-have app for HomeKit and Matter users, making it easy to keep track of all your accessories. This week, developer Aaron Pearce has unveiled HomePass 2, a complete rewrite of the app that adds several excellent new features for Home.....»»
5 reasons to double down on network security
Cybersecurity programs have evolved significantly over the past few decades. The advent of cloud computing shattered the conventional corporate perimeter, forcing organizations to update their defense strategies. Today, with the rise of work-from-any.....»»
How AI is transforming human risk management
While human error has always posed a cybersecurity risk, AI and emerging tech are playing an evolving role in Human Risk Management – uncovering new needs, challenges, and pain points. In this Help Net Security video, Bret Fund, SVP and General Man.....»»