How is the role of the CISO evolving in enterprise security, and what is the importance of having a converged enterprise, where the CISO and CSO roles work together?
Critical steps in security recruitment for both employers and candidates are background or reference checks.
In my December column, I ended with the observation that many CISOs struggle when it comes to first determining and then actually communicating the business value of the security options Read more…
What is inattentional blindness, how can you overcome it and how can visual similarity/computer vision be a solution to the problem?
A new report by IBM X-Force Exchange found that cybercriminals are taking advantage of the coronavirus outbreak, and using it to spread malware.
Let’s put this into perspective. In 2019, the Centre for Disease Control reports that 61,200 people died from the common flu virus. That’s 168 deaths per day! Compared to Coronavirus Read more…
Federal Trade Commission staff sent letters to 19 Voice over Internet Protocol (VoIP) service providers warning them that “assisting and facilitating” illegal telemarketing or robocalling is against the law. “VoIP Read more…
The House Homeland Security Committee advanced the CISA Director Reform Act, which aims to improve operations and efficiency at the Cybersecurity Infrastructure Security Agency (CISA), which is charged with protecting Read more…
Sophisticated hackers infiltrated United Nations networks in Geneva and Vienna last year in an apparent espionage operation that UN top officials did not disclose.
The Federal Trade Commission has finalized settlements with four companies over allegations they made false claims in connection with the EU-U.S. Privacy Shield framework, which enables companies to transfer consumer Read more…