Remove Digital transformation Remove Information Security Remove Military Remove Security
article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today. They must rally the troops to proactively engage, day-to-day, in the intricate and absolutely vital mission of preserving the security of IT assets, without stifling innovation.

Security 309
article thumbnail

Do We Have a Cybersecurity Skills Gap?

Thales Cloud Protection & Licensing

With many security managers seeking a quick fix for their problems, the shortage of qualified IT workers at a time of high demand has put many leaders in a difficult situation. His approach uses the philosophy that is used in the military, whereby an untrained individual is placed into positions based on aptitude.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5G – The Future of Security and Privacy in Smart Cities

Security Affairs

5G technology is here, it is the right time to discuss security and privacy in smart cities and their possible evolution. Or what’s the role of 5G in this transformation? Security Challenges Abound. Managing privacy and security is merely a continuous as well as a dynamic process. But what makes a smart city?

Privacy 47
article thumbnail

Ukraine: Volunteer IT Army is going to hit tens of Russian targets from this list

Security Affairs

Ukraine is recruiting a volunteer IT army of cyber security experts and white hat hackers to launch cyberattacks on a list of Russian entities. Ukraine’s Minister for Digital Transformation Mykhaylo Fedorov called to action against Russia attempting to create an “IT Army” to launch a massive offensive against Russia.

IT 104
article thumbnail

A partnership perspective on government cloud security

IBM Big Data Hub

In response to the COVID-19 crisis, many federal agencies kicked their digital transformations into high gear to help enhance public services, embrace a remote workforce and better secure data with trust and transparency. Edge computing is a strategy for securely extending a digital environment out to the user.

Cloud 52
article thumbnail

Five recommendations for federal agencies to use the cloud to accelerate modernization

IBM Big Data Hub

In response to the COVID-19 crisis, many federal agencies kicked their digital transformations into high gear to help enhance public services, embrace a remote workforce and better secure data with trust and transparency. Edge computing is a strategy for securely extending a digital environment out to the user.

Cloud 56
article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

I’m talking about cybercrime unicorns, talking the fog of cyberwar among nation states, and about a new book that I think will be on the shelves of every information security professional later this summer. Vamosi: The slogan of the RSA Conference is “Where the World Talks Security,” and, in general.