In this videocast interview, Theo Zafirakos, CISO, Terranova Security, provides expert analysis of the "Securing Your Third-Party Supply Chain in 2024 Survey" results, including a deep dive into the core conclusions, including the core detriments of poor visibility of cybersecurity awareness, and how to better...
Welcome to the report summarizing the survey, "Securing Your
Third-Party Supply Chain Through Security Awareness."
In late fall 2023, Information Security Media Group partnered with Forta's Terranova Security and surveyed over 100
senior cybersecurity professionals to identify:
The top organizational challenges in...
Welcome to "Cyber Fail," where our experts uncover fails so we can all strengthen our defenses. Today, we examine what happens when ransomware groups get careless, application developers' laissez-faire attitude toward vulnerabilities, and the security woes of a beleaguered crypto exchange.
Generative AI is a hot topic across all sectors of cybersecurity - but how do you prepare your team internally to use it safely?
This webinar will explore real life case studies, incorporating how threat actors are using AI to attack and how organisations can leverage AI to defend against the constantly changing...
Generative AI is a hot topic across all sectors of cybersecurity - but how do you prepare your team internally to use it safely?
This webinar will explore real life case studies, incorporating how threat actors are using AI to attack and how organisations can leverage AI to defend against the constantly changing...
Security leaders focus on protection and detection, but the new priority is resilience. A resilience strategy should "get the real 'ground truth' of what has happened" in the attack, said Brian Dye, CEO of Corelight, in this episode of "Cybersecurity Insights."
Federal regulators have released guidance that spells out voluntary cybersecurity performance goals for the healthcare sector. The document is a first step in fleshing out the Biden administration's strategy to push hospitals and other healthcare entities to adopt a stronger cybersecurity posture.
As cyberthreats evolve, mobile network operators need offensive security to maintain resilience. Traditional security, such as firewalls and encryption, is not sufficient on its own. Offensive security is proactive; it mimics the strategies of real attackers to stay ahead of potential threats.
Generative AI, once a buzzword, is now the subject of a focused approach, according to attorney Edward Machin of Ropes & Gray LLP. Organizations are prioritizing specific issues around gen AI and establishing governance frameworks from the outset, Machin said.
Mimecast, the cloud security firm specializing in email and cyber resilience, has appointed a new CEO after co-founder Peter Bauer served in the chief executive role since the company's inception in 2003. The leadership transition comes less than two years after the company went private.
Microsoft are set to Invest €3.2 Billion in German AI Infrastructure - but threats are still lurking in the shadows and the AI arms race is ramping up.
Join us as we delve into the intricacies of managing human risk in cybersecurity, exploring real-world consequences and offering insights tailored to the challenges...
Cybersecurity professionals must concern themselves with the number one contributing factor to cyber incidents, human behavior. Reducing the so-called human risk is the goal of security awareness programs. Three steps are required: awareness enables employees to reflect on their behavior. Once employees are empowered...
Criminals have built highly successful business models by hacking into a wide range of organizations at will. University professor John Walker warned that the world is witnessing the unintended consequences of our collective inability to secure assets - kinetic threats to global stability.
Mimecast announced the acquisition of human risk management solutions specialist Elevate Security as part of its initiative to enhance digital workplace protection. The move aims to address evolving cyberthreats by offering insights into human behaviors and risks and empowering customers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.