Campaign URL
Copy
Twitter
0
tweets
Subscribe
Past Issues
RSS
Translate
English
العربية
Afrikaans
беларуская мова
български
català
中文(简体)
中文(繁體)
Hrvatski
Česky
Dansk
eesti keel
Nederlands
Suomi
Français
Deutsch
Ελληνική
हिन्दी
Magyar
Gaeilge
Indonesia
íslenska
Italiano
日本語
ភាសាខ្មែរ
한국어
македонски јазик
بهاس ملايو
Malti
Norsk
Polski
Português
Português - Portugal
Română
Русский
Español
Kiswahili
Svenska
עברית
Lietuvių
latviešu
slovenčina
slovenščina
српски
தமிழ்
ภาษาไทย
Türkçe
Filipino
украї́нська
Tiếng Việt
Cybersecurity Leadership
by
JC Gaillard
Powered by
To Reduce IT Supply Chain Risk, Watch for Insider Threats and External Attackers
From
www.nextgov.com
-
Today, 6:51 AM
The idea that a supply chain attack could compromise hardware used to power critical systems has troubled the public and private sectors alike for several years.
Who wants to be a CISO ?
From
corixpartners.com
-
January 3, 6:28 AM
Talent alienation is the biggest issue behind the cybersecurity management skills gap, but it shouldn’t be the case. Who wants to be a CISO these days?
Our Cyber Glass Ceiling
From
www.infosecurity-magazine.com
-
December 29, 2018 6:48 AM
We can either bemoan the status quo or identify an approach that allows us to articulate our business value in a quantifiable way
4 Ways to Overcome the Cyber Workforce Shortage
From
securityintelligence.com
-
December 27, 2018 7:42 AM
The supply/demand ratio for the cyber workforce is now about 2.3 skilled workers per job opening, according to NIST. Security leaders need to be more creative to fill the gaps in their teams.
A third of cyber attacks exploit unsecure remote working
From
www.itpro.co.uk
-
December 21, 2018 6:44 AM
Report claims business leaders are failing to educate employees about cyber security risks
Cyber Security: What can we expect from 2019?
From
www.technative.io
-
December 18, 2018 7:17 AM
The past 12 months have been a maze of cyber security challenges, ranging from the almost constant data breach headlines to the introduction of that little thing call the GDPR. Now, as 2019 comes rushing up to greet us, what can we expect to see dominating the industry?
Overcoming the Cloud Security Compliance Conundrum
From
securityintelligence.com
-
December 14, 2018 7:11 AM
Compliance with various regulations and cloud security requirements has expanded as technology and cloud uptake advance, leaving organizations with a challenging conundrum to solve.
Hackers Can Destroy Your Business. Here’s How to Stop Them.
From
futurism.com
-
December 13, 2018 7:42 AM
Cybersecurity is a digital arms race now and the current situation is ugly. Businesses are constantly under siege from hackers, but we can stop them.
Cybersécurité : Quelles pratiques doivent adopter les entreprises ?
From
www.latribune.fr
-
December 11, 2018 7:18 AM
Malgré une prise de conscience des risques liés à cybercriminalité, de nombreuses entreprises n'ont pas encore pris le problème à bras le corps comme le montre la multiplication des cyberattaques d'envergure ces dernières années. Pourtant, certains outils et des bonnes pratiques permettent d'anticiper et minimiser sensiblement l'impact d'un cyber-risque.
Why CISOs Need To Teach Everyone To Own Risk
From
www.forbes.com
-
December 11, 2018 6:54 AM
Cybersecurity can never reach a state of 100% protection. There will always be tradeoffs. Therefore, CISOs need to help individuals in their companies understand this reality so that informed decisions can be made to guide the business forward.
10 security trends to watch in 2019
From
www.hpe.com
-
December 7, 2018 7:46 AM
This has been quite a year for data breaches, with reports that numerous unsecured Amazon Web Services storage containers were inadvertently made public, a rise in hidden cryptomining malware, and lots of victims continuing to fall for ransomware and other botnet attacks. So, with that context, let’s look at what security trends 2019 could bring and ways to prepare for the coming year.
The Case for a Human Security Officer
From
www.darkreading.com
-
December 6, 2018 7:21 AM
Wanted: a security exec responsible for identifying and mitigating the attack vectors and vulnerabilities specifically targeting and involving people.
Cybersecurity In An Agile World
From
www.forbes.com
-
January 4, 6:26 AM
How does cybersecurity impact software development in an agile workflow?
3 Tips to Improve Cyber and Privacy Board Reporting
From
www.thedigitaltransformationpeople.com
-
January 2, 5:48 AM
Corporate boards are facing mounting pressure concerning their oversight of cybersecurity and privacy risks. Regulatory guidance, emerging regulatory requirements, fines, and lawsuits are shaping a new and evolving standard of care with exponentially increasing exposures for today’s directors and their organizations.
Cybersecurity means investment in people, not services
From
techhq.com
-
December 28, 2018 6:34 AM
Just employing a Computing Science major doesn't mean your cybersecurity is sown up for good – you need a constant investment.
How our data got hacked, scandalized, and abused in 2018
From
www.fastcompany.com
-
December 24, 2018 6:52 AM
This year tech giants, governments, and even the humble sandwich chain have proved that we can trust no one with our personal data.
Creating the right structure for effective information security
From
horizoncio.network
-
December 20, 2018 5:48 AM
Is the CISO role under scrutiny and who owns information security asks Mike Altendorf
Stopping Data Breaches Will Require Help from Governments
From
hbr.org
-
December 17, 2018 9:05 AM
Companies should be prepared, but can’t thwart every attack.
Supply Chain Security: Managing a Complex Risk Profile
From
threatpost.com
-
December 14, 2018 7:05 AM
Experts sound off on how companies can work with their third-party suppliers and partners to secure the end-to-end supply chain.
NotPetya leads to unprecedented insurance coverage dispute
From
www.techlawx.com
-
December 12, 2018 6:48 AM
Global company, Mondelez International, sued Zurich Insurance over the NotPetya cyber attack. The question is whether NotPetya was "hostile or warlike action"
A Layered Approach to Cybersecurity: People, Processes, and Technology
From
www.csoonline.com
-
December 11, 2018 7:03 AM
Cybercrime is an ever-present threat facing organizations of all sizes. In order to safeguard themselves against a successful data breach, IT teams must stay a step ahead of cybercriminals by defending against a barrage of increasingly-sophisticated attacks at high volumes.
Stopping the Cybersecurity Brain Drain Calls for Outside the Box Thinking
From
www.nextgov.com
-
December 10, 2018 7:29 AM
Here are some non-traditional ways to fill those vacant positions.
Cybersecurity: An Execution Challenge
From
corixpartners.com
-
December 6, 2018 7:29 AM
The true cybersecurity challenge is an execution challenge, and that’s rooted in governance, culture and management experience
UK consumers threaten data breach backlash
From
www.computerweekly.com
-
December 6, 2018 7:05 AM
Most UK and global consumers are willing to walk away from businesses that fail to look after personal data, with retailers most at risk, research shows.
This email was sent to
<<Email Address>>
why did I get this?
unsubscribe from this list
update subscription preferences
Corix Partners · 269 Farnborough Road · Farnborough, Hampshire GU14 7LY · United Kingdom