When it comes to perimeter security, strong upfront planning and swift real-time reactions supported by technology can go a long way in helping an enterprise secure its outermost layer.
How can security leaders be sure to shore up that outermost barrier at their organizations? When it comes to perimeter security, strong upfront planning and swift real-time reactions supported by technology can go a long way in helping an enterprise secure their most important assets.
New Tessian report reveals that cybersecurity jobs weathered Covid-19 storm and explains why industry needs to address issue with equal pay to encourage more women to join
March 8, 2021
While the global job market has been hit hard by the pandemic, cybersecurity job recruitment thrived in 2020. According to a new global report from human layer security company Tessian, titled Opportunity in Cybersecurity 2021, 94% of women in cybersecurity hired new staff members in 2020 to support their teams, with IT, finance and healthcare industries making the most hires.
The Cybersecurity and Infrastructure Security Agency (CISA) has awarded the University of Texas at San Antonio Center for Infrastructure Assurance and Security (CIAS) a $1.2 million grant to conduct a pilot program to help state, local, tribal and territorial governments identify high value assets (HVA) to prioritize resources and planning.
We asked several Women Security Leaders to tell us what drew them into the profession, along with their thoughts on continued diversification of the industry.
The Unofficial Law of Endpoint Security Proportionality: The security measures taken to protect an employee’s endpoint are proportionate to the proximity of the employee to the company’s most valued assets. Or, put in simpler terms, the more closely an employee works with a company’s crown jewels, the more essential it is to virtually eliminate the possibility of an endpoint security breach.
GroupSense’s director of intelligence operations Bryce Webster-Jacobsen outlines the U.S. Department of Defense’s Cybersecurity Maturity Model Certification’s Impact on Defense Contractors.
In order to combat cybersecurity threats, the Biden administration and state governors across the country should immediately work to foster deeper relationships with the private sector. Tech and government certainly don’t always get along, but the threats we face now require a national effort that would rival the Space Race of the 1960s. This can be done through state and federal governments offering financial incentives to businesses that prioritize the development and integration of cybersecurity measures, amplified communication from the government concerning the importance of cybersecurity, as well as the potential bolstering of compliance standards to minimize threats and the negative impact of breaches.
In a paper released recently, “An integrated cyber approach to your cloud migration strategy,” Deloitte explores how an integrated cloud-cyber strategy enables organizations to use cyber as a differentiator, and outlines how cybersecurity teams must adapt.
The year 2020 presented society and the campus community with very difficult and unique challenges. Let’s take a look at a practical, fiscally responsible approach that security leaders can implement to maintain traditional services and respond to unique challenges, all while preparing for the unexpected.
Campus police and security teams are tasked with not only providing a professional and measured response to volatile and politically charged issues, but must still maintain traditional, expected and valuable services, all within budgets that, for many campus security teams, will probably not be increasing. Let’s take a look at practical security practices campus safety leaders can implement.
The use of artificial intelligence (AI) in cybersecurity, while often overhyped, is not a new concept. Hackers have included countermeasures in malware since its inception to detect runtime environments or sense detection attempts. Early actions were primitive compared to what we know today, but they laid the groundwork for more critical thought about adaptive and evasive technologies and sophisticated situational awareness. This lethal combination of research and deep targeting is likely the future of malware as adversaries attempt to outsmart the companies and researchers trying to thwart them.