Tag: technology
-
Executive Perspectives, Episode 2, Michelle Faylo
Axio CEO, Scott Kannry recently sat down with Michelle Faylo, US Cyber & Technology Leader of Lockton in our executive perspectives podcast. In each episode, we interview the world’s top Read More First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/10/executive-perspectives-episode-2-michelle-faylo/
-
Keeper Security Appoints New CISO
Keeper Security has announced the appointment of James Scobey as the company’s first Chief Information Security Officer (CISO). Scobey joins Keeper from the U.S. Securities and Exchange Commission (SEC), where he has served as CISO since 2022. Scobey’s experience encompasses almost three decades of cybersecurity, information technology and leadership roles across both the public and…
-
ACDS Appoints New Managing Director
UK cybersecurity start-up Advanced Cyber Defence Systems (ACDS) is pleased to announce the appointment of Ed Hume as the new Managing Director. Hume brings extensive experience in the technology and cybersecurity sectors, and his leadership will be pivotal in guiding ACDS’s global expansion and innovation. Under his direction, ACDS aims to strengthen its position as a…
-
This AI Tool Helped Convict People of Murder. Then Someone Took a Closer Look
Global Intelligence claims its Cybercheck technology can help cops find key evidence to nail a case. But a WIRED investigation reveals the smoking gun often appears far less solid. First seen on wired.com Jump to article: www.wired.com/story/cybercheck-crime-reports-prosecutions/
-
It Seemed Like an AI Crime-Fighting Super Tool. Then Defense Attorneys Started Asking Questions
Global Intelligence claims its Cybercheck technology can help cops find key evidence to nail a case. But a WIRED investigation reveals the smoking gun often appears far less solid. First seen on wired.com Jump to article: www.wired.com/story/cybercheck-crime-reports-prosecutions/
-
China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns
China’s National Computer Virus Emergency Response Center (CVERC) has doubled down on claims that the threat actor known as the Volt Typhoon is a fabrication of the U.S. and its allies.The agency, in collaboration with the National Engineering Laboratory for Computer Virus Prevention Technology, went on to accuse the U.S. federal government, intelligence agencies, and…
-
How satellites are pushing security innovation at Amazon
There are few bigger realms of innovation than technology dedicated to outer space. Amazon is using that realm to spurn innovation in its own cybersecurity practices. First seen on cyberscoop.com Jump to article: cyberscoop.com/amazon-cybersecurity-culture-project-kuiper/
-
Fighting Crime With Technology: Safety First
By combining human and nonhuman identity management in one solution, Flock Safety is helping law enforcement solve an impressive number of criminal cases every day. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/fighting-crime-with-technology-safety-first
-
Beware of Fake AI Scam calls that Takeover your Gmail Account
Scammers use sophisticated AI technology to impersonate tech giants like Google, aiming to take over unsuspecting users’ Gmail accounts. A recent incident highlights these fraudsters’ cunning tactics, underscoring the need for heightened vigilance. The Initial Contact: A Suspicious Notification The trouble began with an unexpected notification. The user received a prompt to approve a Gmail…
-
CIOs want a platform that combines AI, networking, and security
While AI has captured the attention of the technology industry, the majority of CIOs and senior IT leaders are primarily focused on the convergence of networking and security, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/10/14/ai-network-security-challenges/
-
InCyber Forum Canada 2024
The InCyber Forum Canada 2024 conference is an outstanding event, packed with multiple stages, many thought-leadership panels, and an expansive array of vendors showcasing their latest innovation. Come join me in Montreal Canada, Oct 29th-30th, and check out our panel Protect your Data, Thrive in Business: Strike a Balance on the Trust & Safety stage…
-
Hackers Prowling For Unencrypted BIG-IP Cookies, Warns CISA
Agency Says Cookies Could Help Attackers Find Network Assets, Vulnerabilities. Unencrypted cookies tied to a suite of secure gateway technology from F5 are gateways for hackers to reach internal devices on corporate networks, warns the Cybersecurity and Infrastructure Security Agency. BIG-IP uses persistent cookies as a traffic load-balancing convenience. First seen on govinfosecurity.com Jump to…
-
IronNet Has Shut Down
After retiring in 2014 from an uncharacteristically long tenure running the NSA (and US CyberCommand), Keith Alexander founded a cybersecurity company called IronNet. At the time, he claimed that it was based on IP he developed on his own time while still in the military. That always troubled me. Whatever ideas he had, they were…
-
Canalys: There are reasons for optimism
Chief analyst shares reasons why the channel should be positive, but encourages investment in emerging technology and services to remain relevant First seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366613437/Canalys-There-are-reasons-for-optimism
-
TD Synnex: AI and security top channel technology investments
Distributor shares its latest report on the areas where partners are spending money and looking to support customers First seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366613277/TD-Synnex-AI-and-security-top-channel-technology-investments
-
Passwordless Authentication without Secrets!
Tags: access, attack, authentication, breach, business, ciso, cloud, compliance, conference, credentials, cybercrime, data, data-breach, encryption, finance, GDPR, healthcare, iam, ibm, identity, infrastructure, mfa, office, passkey, password, privacy, regulation, risk, software, strategy, technology, updatePasswordless Authentication without Secrets! divya Fri, 10/11/2024 – 08:54 As user expectations for secure and seamless access continue to grow, the 2024 Thales Consumer Digital Trust Index (DTI) research revealed that 65% of users feel frustrated with frequent password resets. This highlights an increasing demand for advanced authentication methods like passkeys and multi-factor authentication (MFA),…
-
Cyber risk tops C-suite concerns heading into US election
A report by PwC shows American business leaders will continue to focus on data regulation, AI and technology investments regardless of which party prevails in November. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/c-suite-cyber-risk-presidential-election/729477/
-
SSA Struggling to Modernize Fraud Prevention Tech, GAO Warns
GAO: SSA Fails to Meet Industry and Federal Electronic Verification System Goals. The Social Security Administration is facing criticism for failing to update its fraud prevention technology, leaving financial institutions and federal authorities at risk of missing synthetic identity scams, according to a new Government Accountability Office report. First seen on govinfosecurity.com Jump to article:…
-
5 Disadvantages of Technology in Education
Technology has seeped its way into every facet of today’s education environment. Students rely on it for their learning, educators for planning and teaching, parents for communication, and institutions for administration. While it offers many advantages, schools are increasingly aware of technology’s potential disadvantages. Left unchecked, these disadvantages can evolve into threats, and even compromise…
-
List of Cybersecurity Initiatives by the Government of India
With the rapid digital transformation across sectors, India has become a hub for technology, innovation, and digital infrastructure. Nevertheless, this transformation is accompanied by a high level of cyber threats and risks implying cybersecurity as one of the critical concerns for individuals, organizations, and government institutions. Lately, the Indian government has made intense efforts to……
-
Career Spotlight: The Growing Demand for OT Security Experts
Critical Infrastructure Firms Are Hiring – and Paying Well As digital transformation continues to reshape industries, the convergence of operational technology and cybersecurity has emerged as a critical area of focus. But there’s a noticeable gap in the workforce. Professionals who truly understand both OT and cybersecurity are in short supply. First seen on govinfosecurity.com…
-
Rejoice! The charade of having to change our passwords every few months is coming to an end | Kate O’Flaherty
The US government is finally admitting there’s no need instead, to fend off cyber-attacks we need passwords that are long but memorableOver the past decade or so, people have accumulated a vast array of logins for dozens of sites and apps, as more of our work and home lives moves on to the internet. That’s…
-
NIST CSF 2.0: A CISO’s Guide
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) has become one of the most widely adopted standards… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/10/nist-csf-2-0-a-cisos-guide/
-
MI5 Chief Warns of Cyberthreats to the UK
Russia, Iran and China Investing in Cyber Ops, Warns MI5 Director Ken McCallum. Nation-state actors are investing aggressively in advanced cyber operations to target government information and technology in a bid to sow mayhem on British and European streets, warned a top British intelligence official. Russia, Iran and China are using proxies and hacking agencies.…
-
Die neuen PQC-Standards des NIST in drei Schritten zur quantensicheren Verschlüsselung
Vor wenigen Wochen hat das US-amerikanische National Institute of Standards and Technology (NIST) die ersten drei von insgesamt vier Post-Quantum-Krypto-Algorithmen finalisiert. Mit den Federal Information Processing Standards (FIPS) 203, 204 und 205 haben Unternehmen nun erstmals die Möglichkeit, ihre Verschlüsselungsverfahren so einzurichten, dass sie nachweislich quantensicher sind also auch in einer Post-Quantum-Welt […] First seen…
-
The Value of AI-Powered Identity
Introduction Artificial intelligence (AI) deepfakes and misinformation may cause worry in the world of technology and investment, but this powerful, foundational technology has the potential to benefit organizations of all kinds when harnessed appropriately. In the world of cybersecurity, one of the most important areas of application of AI is augmenting and enhancing identity management…
-
Managing OT and IT Risk: What Cybersecurity Leaders Need to Know
Tags: ai, attack, breach, cloud, compliance, container, control, credentials, cyber, cyberattack, cybersecurity, data, data-breach, defense, detection, endpoint, exploit, finance, group, guide, infrastructure, Internet, iot, malware, mobile, network, nis-2, ransomware, resilience, risk, software, strategy, technology, threat, tool, ukraine, vulnerability, vulnerability-management, windowsSecurity leaders face the challenge of managing a vast, interconnected attack surface, where traditional approaches to managing cyber risk are no longer sufficient. Modern threats exploit vulnerabilities across domains, requiring a more holistic approach to avoid operational disruption, safety risks and financial losses. In today’s rapidly evolving digital landscape, security leaders face an unprecedented challenge:…