article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. Role-based access controls, multi-factor authentication, and adherence to standard screening checklists are essential to securing the cloud environment.

article thumbnail

Storytelling for CIOs: From niche to bestseller

CIO Business Intelligence

The late Richard Sykes, CIO of pharmaceuticals giant ICI in the 1990s and later a columnist for CIO magazine, famously scripted starkly different scenarios of the future of ICI for board members early in his IT role. Miguel Traquina, CIO of biometric authentication company iProov, agrees. Why tell stories?

article thumbnail

Review risks, focus on response plans: Security experts offer tips to prep for Russian cyberattacks

GeekWire

Check your change management processes and automated patching to ensure that code can’t be injected into production systems. Use multi-factor authentication. And of course, back up a good password with multi-factor authentication, like the SMS to a phone or an app like Google Authenticator!

Security 113