article thumbnail

What You Need To Know About The Administration’s Cybersecurity National Action Plan

CTOvision

The Whitehouse released a plan on 9 Feb 2016 that should be read and understood by cybersecurity professionals everywhere. The plan calls for a campaign to encourage people to use multi-factor authentication in everything. The plans calls for the creation of a federal chief information security officer. Bob Gourley.

article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO Business Intelligence

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] Are you enforcing security policies consistently everywhere throughout the network? European Union. European Union.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence

Network World

READ MORE ON NETWORK WORLD: 5 enterprise technologies that will shake things up in 2017 + Just take a look at some recent Gartner assessments of the security situation: By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk.

article thumbnail

Tech Moves: Expedia board director Skip Battle resigns; Madrona promotions; Vacasa’s new CFO

GeekWire

Prior to joining collaboration work management Smartsheet in 2016, Ceran held executive roles at Box and eBay. Identity authentication startup Auth0, which raised a $120 million Series F round in July, added three new board members: • Former Hewlett Packard Enterprise Chief Sales and Marketing Officer Sue Barsamian.

Groups 77
article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

Information Security: Cyber Threats and Data Breaches Illustrate Need for Stronger Controls across Federal Agencies, July 08, 2015 GAO Info Security (Today) - What GAO FoundFederal systems face an evolving array of cyber-based threats. Privileged user authentication and PKI are. Some are already.

Insurance 150
article thumbnail

Impact of technology on insurance industry

Hacker Earth

IT security (53%). Digital identity authentication regulations (45%). Decentralized blockchain makes it easier to authenticate transactions, policies, and customers. EY, 2016) It can help manage the huge volumes by ensuring P2P device communication. Talent (87%). Data storage, privacy, and protection regulations (63%).

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

For example, in March of 2016, two researchers, Mike Ahmadi and Billy Rios independently reported an astounding fourteen hundred vulnerabilities to CareFusion's Pyxis SupplyStation, an automated, networked, supply cabinet used to store and dispense supplies. Unfortunately, in the world of medical devices, such stories aren’t uncommon.