Remove Digital transformation Remove Information Security Remove Military Remove Risk
article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today. Observes Salvi: “We’ve gone to a stage where the Chief Information Security Officer has become a well-defined, mainstream role. Related: Why U.S. None of this is easy.”

Security 309
article thumbnail

Do We Have a Cybersecurity Skills Gap?

Thales Cloud Protection & Licensing

His approach uses the philosophy that is used in the military, whereby an untrained individual is placed into positions based on aptitude. If corporations looked internally, they could find people who demonstrate a proclivity towards security, and those people could be trained to be part of the security workforce.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5G – The Future of Security and Privacy in Smart Cities

Security Affairs

Security Challenges Abound. 5G promises a lot of things , but there’re risks attached too, though the good stuff outweighs them. Managing privacy and security is merely a continuous as well as a dynamic process. However, with internet connectivity come the cyber risks with bad actors looking to create unknown havoc.

Privacy 47
article thumbnail

Five recommendations for federal agencies to use the cloud to accelerate modernization

IBM Big Data Hub

In response to the COVID-19 crisis, many federal agencies kicked their digital transformations into high gear to help enhance public services, embrace a remote workforce and better secure data with trust and transparency. Edge computing is a strategy for securely extending a digital environment out to the user.

Cloud 57
article thumbnail

A partnership perspective on government cloud security

IBM Big Data Hub

In response to the COVID-19 crisis, many federal agencies kicked their digital transformations into high gear to help enhance public services, embrace a remote workforce and better secure data with trust and transparency. Edge computing is a strategy for securely extending a digital environment out to the user.

Cloud 52
article thumbnail

Group-IB Hi-Tech Crime Trends 2020/2021 report

Security Affairs

Hi-Tech Crime Trends 2020/2021is intended forrisk management and strategic planning specialists in the cybersecurity field as well as members of boards of directors in charge of digital transformation and investing in cybersecurity systems. Military operations conducted by various intelligence services are becoming increasingly common.