article thumbnail

The CISO role in cybersecurity: Solo or team sport?

Cloud Musings

This alarming statistic is just one of the reasons why the National Cybersecurity Institute at Excelsior College (NCI) undertook the task of surveying the nation’s chief information security officers. Which of the following are the top five sources of application security risk within your organization?

Sports 70
article thumbnail

The chaotic and cinematic MGM casino hack, explained

Vox

MGM, which owns more than two dozen hotel and casino locations around the world as well as an online sports betting arm, reported on Monday that a “cybersecurity issue” was affecting some of its systems, which it shut down to “protect our systems and data.” Ransomware attacks aren’t unusual these days.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

The Verizon Threat Research Advisory Center provides monthly webinars packed with insightful analysis to help unmask threat actors’ evolving tactics, techniques and procedures (TTPs), and provides other insights to help you stay informed.

article thumbnail

Spooky, Scary Tales of Vendor Management

SecureWorld News

In that particular data breach, approximately 147 million consumers had their information compromised, including personally identifiable information ("PII") like names, social security numbers and birth dates. Discipline is key and not only for sports teams. Do you need your vendors to be ISO certified?

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

What if you are a woman in information security? I’m Robert Vamosi, and in the episode I’m talking about diversity, equality, and inclusion in information security with one of the industries' most successful examples. I can dream about being different because there are white male role models.

article thumbnail

The Hacker Mind Podcast: Hacking Communities

ForAllSecure

There's another really common name that kind of remember because it's too common word but for informal gathering to do a virtual version of a city's tech meetup or something, that's okay, because you're not trying to do that whole experience the whole conference experience. Vamosi: Facebook is a very special form of social media.

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

But how exactly will artificial intelligence help bridge the information security skills gap? And even with the help of machine learning algorithms, what kinds of security work is still best left to humans? They won with Mayhem, an assisted intelligence application security testing solution. Paul Roberts: Exactly.