It is no secret that finding and recruiting strong Chief Information Security Officer (CISO) candidates is far from easy. Many CISOs typically stay in a role for a few years and subsequently are not able to dedicate adequate time to the development of junior leaders who could become the next wave of security leaders. Most organizations are forced to look externally for the experience they require. However, looking for outside hires also contributes to the shortage of potential internal leaders, as skilled professionals are often overlooked. For the security industry to thrive, this needs to change, and it starts with grooming the next generation of leaders.
According to a report from Cisco, 5G’s faster broadband (10 to 20 times faster than 4G) will enable 12 billion mobile-ready devices and IoT connections by 2022 compared to 9 billion in 2017. While this is great news for the rising number of smart device users globally, the increased connectivity can be taxing for IoT security. The combination of higher bandwidth and lower latency is a double-edged sword. While it enables new, exciting use cases like Vehicle-to-Vehicle and telemedicine, it is critical to not lose sight of the fact that it expands the scope of security threats, such as ransomware and botnets, among others.
Although the ransomware plague took a nosedive in terms of the victim count years ago, it’s still alive and kicking. It used to home in on any computers indiscriminately, but at some point, the malicious actors realized they could squeeze a lot more profit out of the enterprise than out of individual users. This shift made businesses the most coveted target for ransomware operators.
The Cybersecurity and Infrastructure Security Agency (CISA) warns users to remain on alert for malicious cyber activity targeting potential disaster victims and charitable donors following a hurricane.
The Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC) was formed as a nonprofit by a group of U.S.-based maritime critical infrastructure stakeholders to promote cybersecurity information sharing throughout the community.
A new survey from CyberArk found that work-from-home habits– including password re-use and letting family members use corporate devices – are putting critical business systems and sensitive data at risk.
According to the latest industry data released today from Veeam® Software, almost half of global organizations are being hindered in their digital transformation journeys due to unreliable, legacy technologies with 44% citing lack of IT skills or expertise as another barrier to success.
With the flight to remote work happening so suddenly, senior decision makers at small and medium sized businesses simply haven’t come to reality with their cybersecurity capabilities, and in turn, vulnerabilities.