Cybersecurity Visuals

Schneier on Security

The Hewlett Foundation just announced its top five ideas in its Cybersecurity Visuals Challenge. The problem Hewlett is trying to solve is the dearth of good visuals for cybersecurity. Uncategorized contests cybersecurity

Singapore Launches IoT Cybersecurity Labelling

Data Breach Today

Labels Will Indicate What Security Standards Products Meet Singapore has launched an IoT cybersecurity labelling program intended to improve the baseline security of internet-connected consumer products.

IoT 170

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Cybersecurity Advice for the COVID-19 Era

Data Breach Today

CISA Adviser Joshua Corman Discusses Essential Steps Many healthcare organizations have under-resourced security teams, putting them at higher risk for cyber incidents during the COVID-19 pandemic that could result in patient harm, warns cybersecurity expert Joshua Corman

Thinking of a Cybersecurity Career? Read This

Krebs on Security

Thousands of people graduate from colleges and universities each year with cybersecurity or computer science degrees only to find employers are less than thrilled about their hands-on, foundational skills.

Cybersecurity Leadership: Risk Exposure Awareness

Data Breach Today

In this latest in a series of CEO/CISO panels, cybersecurity leaders talk frankly about the new risk surface and the role emerging technologies play in helping us keep pace with our adversaries

Risk 165

Cybersecurity Firm McAfee Files for IPO

Data Breach Today

Separately, Ivanti Buys Security Firms MobileIron and Pulse Secure McAfee is set to become a public company once again, with the cybersecurity firm filing for an IPO with the U.S.

Cybersecurity Leadership: The New Threat Landscape

Data Breach Today

CEOs and CISOs on How to Respond to Disruption, Distortion and Deterioration Disruption, distortion and deterioration - these cybersecurity threats are amplified by the ongoing pandemic.

Cybersecurity's Inconvenient Truth: The Nation-State Threat

Data Breach Today

Curry, Kellermann and King on Why You Should Be Outraged by Adversaries' Cyber Assaults Has the nation-state threat become like the weather - something everyone talks about, but no one can do anything about? It's time for a strategic change.

US House Passes IoT Cybersecurity Improvement Act

Security Affairs

House of Representatives passed the IoT Cybersecurity Improvement Act, a bill that aims at improving the security of IoT devices. House of Representatives last week passed the IoT Cybersecurity Improvement Act, a bill designed to improve the security of IoT devices. The U.S.

IoT 99

Cybersecurity's Automation Imperative

Data Breach Today

Censornet's Richard Walters on the Role of Autonomous Security With cybersecurity becoming ever more difficult to monitor and manage, and product and data overload triggering cyber fatigue among cybersecurity professionals, organizations must embrace more autonomous approaches, says Censornet's Richard Walters

Calls Grow to Restore White House Cybersecurity Leader Role

Data Breach Today

Lack of Cybersecurity Leadership, Direction Cited by Government Watchdog The U.S. Government Accountability Office is urging Congress to pass legislation to reestablish the White House cybersecurity coordinator role, to coordinate the government's response to online attacks and other cybersecurity challenges facing the nation

Hot Topics in Cybersecurity Research

Data Breach Today

Wade Baker Talks Vulnerability Triage and Quantifying Risk Quantifying risk is a significant challenge in cybersecurity. Wade Baker of Cyentia Institute discusses recent research projects

Cybersecurity's Week From Hell

Data Breach Today

Is this cybersecurity's new normal Fix WhatsApp, Windows, Cisco and CPUs From Intel - Pending Patch Availability Multiple flaws - all serious, exploitable and some already being actively exploited - came to light this week. Big names - including Cisco, Facebook, Intel and Microsoft - build the software and hardware at risk. And fixes for some of the flaws are not yet available.

Congress Questions NASA on Cybersecurity Efforts

Data Breach Today

Space Agency Still a Prime Target for Hackers, Officials Say Foreign and domestic hacking activity targeting NASA continues to grow at a time when many staffers are working at home, space agency officials testified at a Friday Congressional hearing where they were questioned about risk mitigation efforts.

A Guide to the NIST Cybersecurity Framework

Dark Reading

With cybersecurity threats growing exponentially, it has never been more important to put together an efficient cyber-risk management policy, and NIST's framework can help

Cybersecurity Law Casebook

Schneier on Security

Robert Chesney teaches cybersecurity at the University of Texas School of Law. courts cybersecurity lawsHe recently published a fantastic casebook, which is a good source for anyone studying this.

Cybersecurity Plan for 2020 US Election Unveiled

Data Breach Today

Cybersecurity Infrastructure and Security Agency has released its cybersecurity plan for the run-up to the 2020 presidential election, outlining the agency's role as a facilitator that will assist federal, state and local agencies in protecting critical election infrastructure CISA Describes Its Role as Security Facilitator The U.S.

Cybersecurity: Building Better Teams

Data Breach Today

Deborah Kish of Fasoo on Rethinking the Approach When it comes to rethinking how enterprises structure their cybersecurity teams, Deborah Kish of Fasoo says that teamwork and better coordination among stakeholders are essential

Cybersecurity for the Midmarket

Data Breach Today

Global Cyber Alliance's Phil Reitinger Describes Efforts to Bolster SMB, Election Security In 2019, the Global Cyber Alliance debuted its toolkit to help small and midsized organizations bolster cybersecurity. How has the toolkit been received and refined? Phil Reitinger, who heads the alliance, discusses progress

The Human-Centric Cybersecurity Stance

Data Breach Today

Homayun Yaqub of Forcepoint on Why People are the New Perimeter Today's cybersecurity landscape is arguably without a perimeter. Homayun Yaqub of Forcepoint describes a human-centric approach to cybersecurity

Cybersecurity Lessons from the Pandemic

Dark Reading

How does cybersecurity support business and society? The pandemic shows us

A 7-Step Cybersecurity Plan for Healthcare Organizations

Dark Reading

With National Cybersecurity Awareness Month shining a spotlight on the healthcare industry, security pros share best practices for those charged with protecting these essential organizations

Cybersecurity During COVID-19

Schneier on Security

covid19 cybersecurity hacking phishingThree weeks ago (could it possibly be that long already?), I wrote about the increased risks of working remotely during the COVID-19 pandemic. One, employees are working from their home networks and sometimes from their home computers. These systems are more likely to be out of date, unpatched, and unprotected. They are more vulnerable to attack simply because they are less secure.

Analysis: Coronavirus Cybersecurity and Privacy Issues

Data Breach Today

The latest edition of the ISMG Security Report offers an analysis of cybersecurity and privacy issues raised by COVID-19 research efforts. Also featured: the latest ransomware trends and an investor's take on hot cybersecurity sectors

Cybersecurity Sector Faces Reckoning After Coronavirus Hits

Data Breach Today

Amidst fears that a recession could tank the global economy, some experts still see upsides for the cybersecurity sector Wall Street Suffers Worst Loss in 12 Years; White House Floats Stimulus Package Wall Street has been hit by the twin threats of the new coronavirus as well as oil prices plummeting, with the Dow dropping 2,000 points on Monday for its worst day in 12 years.

Analysis: 2020 Cybersecurity Issues

Data Breach Today

The latest edition of the ISMG Security Report discusses 2020 cybersecurity trends, including fixing "fake everything," dealing with the issue of weaponized social media and securing the U.S. presidential election

Virtual Summit Dives Into Healthcare Cybersecurity Issues

Data Breach Today

CISOs, Other Experts to Tackle Hot Topics, Including Challenges During COVID-19 Crisis How have the cybersecurity challenges facing healthcare organizations changed during the COVID-19 pandemic? Information Security Media Group's Healthcare Cybersecurity Virtual Summit, to be held on June 9 and replayed June 10 and 11, will provide insights

Cybersecurity Leaders: Planning (and Budgeting) for 2021

Data Breach Today

CEO, CISO Panel on Resiliency, Insider Risk, 5G and Prioritizing the Spend A hybrid workforce, heightened insider risk, 5G concerns over the expanded attack surface - these are the "more" that people reference when they talk about "doing more with less" in 2021.

Cybersecurity Leadership: What We've Learned From COVID-19

Data Breach Today

Those questions were posed to a panel of cybersecurity leaders, and here are their candid answers CEO, CISO Panel on Innovation, Risk and Lessons Learned From Crisis Management What are the biggest leadership lessons from the COVID-19 pandemic? And what will CEOs and CISOs look back on and say, "Why did we ever do things that way?"

How Automated Workflows Boost Cybersecurity

Data Breach Today

ServiceNow CISO Ben de Bont Shares Lessons Automated workflows can help pre-emptively report cybersecurity risks to the board and allow for better qualitative approaches to interpreting data, says Ben de Bont, CISO of ServiceNow

The Unintended Harms of Cybersecurity

Schneier on Security

Interesting research: " Identifying Unintended Harms of Cybersecurity Countermeasures ": Abstract: Well-meaning cybersecurity risk owners will deploy countermeasures (technologies or procedures) to manage risks to their services or systems. academicpapers cyberattack cybercrime cybersecurity riskassessment risks

How Smaller Companies Can Set Cybersecurity Priorities

Data Breach Today

Consultant Nic Miller Highlights Critical Factors to Consider Small and midsize companies don't need to spend money on expensive security products, says cybersecurity consultant Nic Miller, but they must consider several critical factors as they devise their strategies

Cybersecurity Firm Imperva Discloses Breach

Krebs on Security

“Even if the vendor in question is a cybersecurity company, it doesn’t necessarily mean they’re eating their own dog food.” Imperva , a leading provider of Internet firewall services that help Web sites block malicious cyberattacks, alerted customers on Tuesday that a recent data breach exposed email addresses, scrambled passwords, API keys and SSL certificates for a subset of its firewall users. Redwood Shores, Calif.-based

Building a Corporate Culture That Values Cybersecurity

Data Breach Today

Insights on Gauging an Organization's Security Maturity Level Corporate culture can have a big impact on an organization's ability to achieve cybersecurity objectives, says Jessica Barker, chair of ClubCISO, a private members forum for European information security leaders, who provides insights on gauging an organization's security maturity

Government Agencies Field More Cybersecurity Maturity Models

Data Breach Today

The Pentagon and the Department of Energy are pitching new or revised cybersecurity capability maturity models to help their sectors prioritize cybersecurity investments and refine processes and controls. But should they defer to the NIST Cybersecurity Framework instead Pentagon and DOE Pitch Security Frameworks - But Should They Defer to NIST?

Cybersecurity Leadership: The Next Generation

Data Breach Today

IoT, the cloud, third-party risk - we hear a lot about how the cybersecurity risk surface and threat landscape have evolved. But what about the new business demands on cybersecurity leaders? Christopher Hetner, former global CISO at GE Capital, shares insights

Government Shutdown: Experts Fear Deep Cybersecurity Impact

Data Breach Today

government shutdown is impacting agencies integral to the nation's cybersecurity readiness, and experts fear its long-term impact on the country's cyberattack response capabilities, as well as the risk that it will drive away desperately needed new cybersecurity talent from entering public service Readiness, Morale, Investigations and Recruitment at Risk as Standoff Persists The U.S.

Commission Calls for Revamping US Cybersecurity

Data Breach Today

cybersecurity recommendations and calls for sweeping reforms. Cyberspace Solarium Commission Offers Long List of Recommendations The new Cyberspace Solarium Commission released its highly anticipated report this week that offers more than 75. Here's a look at the key findings

The Cybersecurity Follies: Zoom Edition

Data Breach Today

British Government and Other 'Work-From-Homers' Grapple With Remote Communications The stuck-at-home chronicles have fast become surreal, as remote workers face down a killer virus on the one hand and the flattening of their work and personal lives on the other. To help, many have rushed to adopt Zoom. And for many use cases - hint: not national security - it is a perfectly fine option

Cybersecurity for Remote Workers

Data Breach Today

Pamela Kubiatowski of Zscaler Discuses the Key Risk Mitigation Issues Pamela Kubiatowski of Zscaler provides guidance on mitigating the risks posed by the shift to a work-at-home environment as a result of the COVID-19 pandemic in a preview of an upcoming virtual roundtable discussion