RSA Conference 2021 Kicks Off as a Fully Virtual Experience (RSAC 2021) RSA® Conference, the world's leading information security conferences and expositions, opens its 30th annual event today as a fully virtually experience. RSA Conference is the premier event for...
The Woman Who Clarified Einstein’s Idea (WSJ) Emmy Noether, a pioneer of abstract math, helped explain the theory of relativity to mathematicians.
What CISOs really want from security vendors (CSO Online) Less risk? Better security? Value for dollars spent? Check, check, and check. But of all the things CISOs want from security vendors, trusted partnership tops the list. Here's how leading CISOs find and foster those relationships.
UK faces significant cyber talent shortfall (ComputerWeekly.com) Cyber security sector is struggling to attract the talented workforce it needs.
Cyber-bullying Spawns Artistic Protest (Infosecurity Magazine) Artists turn 700 misogynistic comments made online into 3,000m-long artwork
Quarter of CISOs and IT Leaders Self-Medicate as Pandemic Stress Spikes (Infosecurity Magazine) Quarter of CISOs and IT Leaders Self-Medicate as Pandemic Stress Spikes. OneLogin claims only half have access to mental health services
Challenging Our Education System to Nurture the Cyber Pipeline (Dark Reading) Let's teach students how to teach themselves. Once we do that, we will have taught a generation of students how to think like hackers.
How to select a cybersecurity framework to protect your greatest assets: People, property and data () Even if you are not mandated to adhere to any particular regulations, it still makes sense for your business to be proactive in managing risk. All frameworks include guidance for good cybersecurity hygiene, such as effective inventory and asset management, contingency planning, personnel security, system access control, and staff awareness and training, to list a few. To prepare for the aftermath of a cyber incident, frameworks provide incident response guidelines you can follow to recover and try to limit the damage. Establishing a framework can not only help your organization follow best practices but also bring rigorous cyber discipline to your organization.
Cybercriminals exploit these cognitive biases the most () A new report examines how cybercriminals are using cognitive bias techniques to target employees in social engineering attacks.
President Biden signs executive order to strengthen U.S. cybersecurity defenses () U.S. President Joe Biden has signed an executive order (EO) to improve the cybersecurity of the U.S. As the U.S. faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately people’s security and privacy, the EO seeks to improve efforts to identify, deter, protect against, detect, and respond to these actions and actors. Specifically, the EO will:
Half of women in cybersecurity report positive career impact from COVID-19 () While the global job market has been hit hard by the pandemic, cybersecurity job recruitment thrived in 2020. According to a new global report from human layer security company Tessian, titled Opportunity in Cybersecurity 2021, 94% of women in cybersecurity hired new staff members in 2020 to support their teams, with IT, finance and healthcare industries making the most hires.
A New On-Ramp To Cyberspace (Cybercrime Magazine) Career paths for young people, minorities, and women
Women Hold 25 Percent of Cybersecurity Jobs Globally In 2021 (Cybercrime Magazine) Cybersecurity Ventures and WiCyS announce research and media partnership
Deloitte puts women in cyber in the spotlight (PR Newswire) /PRNewswire/ -- Deloitte Cyber introduced today a new global awareness and recruitment campaign to attract more women with diverse skill sets and backgrounds...
2021 Return to Workplace Survey | Deloitte US (Deloitte United States) Deloitte's Return to Workplaces Survey provides insights from clients on hybrid work models, masks, distancing and vaccines as we navigate the next new normal.
Ransomware Gangs: We Applied for a Job With One Online | CyberNews (CyberNews) We spoke with threat actors who were running a Ragnar Locker ransomware affiliate operation for more than a decade.
APT in action: XDSpy and Sandworm | CyberNews (CyberNews) Numerous APT groups have been attacking governments and the private sector. Some of them operated undetected for as long as a decade.
Katie Moussouris about cyberespionage: it is getting a lot muddier | CyberNews (CyberNews) It is quite tricky to parse out whether a cyberattack, such as SolarWinds, is an act of espionage or cyberwar.
10 APT groups that joined the MS Exchange exploitation party | CyberNews (CyberNews) At least five APTs were exploiting the Microsoft Exchange servers before the company released patches. After that, five others joined the party.
Coded bias: do you need to be white to play peekaboo with a robot? | CyberNews (CyberNews) When Joy Buolamwini first started working with social robots, she had to wear a white mask while coding. Otherwise, the robot would simply ignore her.
The NFT craze: buy, mint, or stay away from it? | CyberNews (CyberNews) While NFTs provide bread for some artists, they also come with weighty problems of copyright infringement and potential theft.