By the numbers, who has implemented GenAI in their organization? Who has a dedicated budget? And who understands the AI regulations for their industry? An expert panel discusses the findings of ISMG's First Annual Generative AI Study: Business Rewards vs. Security Risks.
Steve Katz, the world's first CISO, died Saturday night while under hospice care in Long Island, New York. He left a strong legacy - not just as a pioneer and trailblazer in cybersecurity leadership but also as a beloved colleague and mentor who generously shared his time and wisdom.
According to a recent pulse poll from ISACA on generative AI, only 6% of respondents' organizations are providing training to all staff on AI, and more than half - 54% - say that no AI training is provided at all, even to teams directly affected by AI.
Okta has paused product development and internal projects for 90 days to beef up its security architecture and operations for applications, hardware and third-party vendors. Okta will move to strengthen its cyber posture, including a security action plan and engaging with third-party cyber firms.
In the constant struggle to manage the other five pillars - identify, protect, detect, respond and recover - security leaders often do not have governance at top of mind, said Netography CEO Martin Roesch, but he added, "Good governance is the root of having good security."
Make no mistake, beyond all the hype, widespread availability of generative AI is a revolution impacting us all and fundamentally changing how we do business...let alone, communicate. In every revolution there are winners and losers, and there is no opt-out if we want to avoid being left behind by our...
Drenan Dudley, who previously served as deputy national cyber director for strategy and budget at the Office of the National Cyber Director, will temporarily lead the agency while the White House nominee to serve in a permanent capacity awaits a vote in the Senate.
Sam Altman's abrupt exit from OpenAI has sent shockwaves rippling through Silicon Valley over this weekend, but of a variety very different than those that emanated from the recent collapses of FTX and SVB. Altman spent the last six years building a transformational technology.
Compromised mobile apps can be an open door to critical
enterprise app servers and other back-end systems,
and this survey aims to shine a light on a potential hole in
most enterprise security walls – exposing potential gaps in
CISO awareness.
The chief operating officer of an Atlanta-based cybersecurity firm has pleaded guilty and agreed to pay restitution of more than $818,000 in a federal criminal case in which he admitted hacking a Georgia medical center in 2018 in an effort to drum up business for his company.
Compromised mobile apps can be an open door to critical enterprise app servers and other back-end systems, and this survey aims to shine a light on a potential hole in most enterprise security walls – exposing potential gaps in CISO awareness.
In Q2 & Q3 2023, ISMG surveyed over 100 senior cybersecurity...
In today's hyper-connected world, telecommunication service providers play a pivotal role in ensuring seamless communication, data transfer and collaboration for businesses. But the evolving threat landscape of cybersecurity continues to pose significant challenges, which Ian Keller discusses.
In this episode of CyberEd.io's podcast series "Cybersecurity Insights," former Uber CSO Joe Sullivan discusses the Uber trial and offers guidance to future CISOs. Was the Uber case a data breach or not. Sullivan explained why that making that distinction can be complicated.
Global demand for qualified cybersecurity professionals has never been greater. Research shows there’s a shortage of nearly 4 million cybersecurity workers compared to the number of roles that need to be filled.
This whitepaper will walk you through some of the common challenges newcomers to cybersecurity face...
Israel is known for its cyber resilience, but small and medium businesses in the country need to reduce external communication during wartime to reduce their attack surface, said May Brooks-Kempler, director of Cyber Range Solutions and founder and former president of ISC2 Israel Chapter.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.