Leaders in cybersecurity - and in any other business - need to keep a bank account filled with the trust and respect of their employees and make sure that account stays in the black, said Chase Cunningham, aka the Doctor of Zero Trust. He discussed his new book on how to be a good leader.
According to a new survey from ISC2, the nonprofit member organization that promotes cybersecurity education, 82% of cybersecurity professionals say AI will improve their job efficiency by helping them conduct analysis, automate tasks, perform monitoring, predict vulnerabilities and block threats.
About 20% of new companies created in the U.K. every day - or some 800 firms - are scams. These fake businesses are being created from an ocean of stolen high-quality data related to real people, making it hard to spot the fraudsters, said Graham Barrow, director of "The Dark Money Files" podcast.
Business leaders and security leaders agree on
the importance of cybersecurity, but there are
significant differences in how the two groups
perceive and prioritize the threats and view the
role of the other party.
CISO Sam Curry and CMO Red Curry discuss the chaos and disruption of cyberwar and how attacks on critical infrastructure can tactically help attackers in combat, demoralize the general population and affect critical capabilities at just the right point in time.
In the latest weekly update, Joe Sullivan, CEO of Ukraine Friends, joins three editors at ISMG to discuss the challenges of being a CISO in 2024, growing threats from disinformation, vulnerabilities in MFA, AI's role in cybersecurity, and the obstacles to public-private information sharing.
Welcome to "Cyber Fail," where our experts uncover fails so we can all strengthen our defenses. Today, we examine what happens when ransomware groups get careless, application developers' laissez-faire attitude toward vulnerabilities, and the security woes of a beleaguered crypto exchange.
Security leaders focus on protection and detection, but the new priority is resilience. A resilience strategy should "get the real 'ground truth' of what has happened" in the attack, said Brian Dye, CEO of Corelight, in this episode of "Cybersecurity Insights."
Mimecast, the cloud security firm specializing in email and cyber resilience, has appointed a new CEO after co-founder Peter Bauer served in the chief executive role since the company's inception in 2003. The leadership transition comes less than two years after the company went private.
Criminals have built highly successful business models by hacking into a wide range of organizations at will. University professor John Walker warned that the world is witnessing the unintended consequences of our collective inability to secure assets - kinetic threats to global stability.
Chase Cunningham discusses his new book, "How NOT to Lead: Lessons Every Manager Can Learn from Dumpster Chickens, Mushroom Farmers, and Other Office Offenders,” which details critical errors that can undermine your cybersecurity leadership and jeopardize your reputation and your company's future.
Cybersecurity is a critical concern for organizations of all sizes these days, and the responsibility for promoting it often falls on the CISO. But there's often a major disconnect between the CISO and the rest of the C-suite. William Beer of Accenture discussed strategies for bridging the gap.
Cybersecurity professionals are driven to make the world a safer place. But this often comes at a personal cost, as CISO Don Gibson discovered. At the age of 44, the price of stress and long hours was unexpected heart surgery. “How you adapt to change can really help you going forward," he said.
Kai Roer, CEO and founder of Praxis Security Labs, delved into the transformative potential of generative AI in reshaping the mindset and behaviors of security teams and organizations. Amid the buzz around large language models, he highlighted the need for a proactive and adaptive approach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.