How machine learning impacts information security

O'Reilly Media - Ideas

The O’Reilly Data Show Podcast: Andrew Burt on the need to modernize data protection tools and strategies. They list important changes to the information landscape and offer suggestions on how to alleviate some of the new risks introduced by the rise of machine learning and AI.

Information Security Spending: Don’t Be Fooled by Overconfidence

The New Stack

Spending on information security continues to increase, but those gains may decelerate as companies become more confident in their security posture. Sentiment about security may be due to increased spending in previous years.

Q&A with John Masserini, Chief Information Security Officer at Millicom

Sailpoint

In this Q&A we spoke with John Masserini, chief information security officer at international telecommunications provider Millicom. Masserini talks with us about his interesting career path in information security, cloud security, and identity management.

3 Ways to Improve Information Security in the Workplace

Strategy Driven

In the new digital world where everything is shared and connected, there is a growing concern about information security and integrity of the data you keep. While we know that there is no such thing as an unbreakable system, we can use some ground rules to improve data-security.

VOIP 65

How to Package and Price Embedded Analytics

struggle to integrate analytics into their products, business models, and pricing strategies in a way that meets a range of user. With this approach, you turn features off and on through visibility controls, conditional logic, and your application’s security model. Use this information.

Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met. ”—Jacki Monson, chief privacy and information security officer, Sutter Health. READ MORE ON MEDICAL SECURITY.

Security vs Compliance | Hacking In To Cybersecurity

Linux Academy

Welcome back to another iteration of Hacking In To Cybersecurity! Our previous posts in this series have focused on informing you, the reader, on how to land a job in the cybersecurity career field , but we’re going to switch gears in this episode and talk about something that every security professional needs to understand: Does Compliance equal Security? Security Defined. Security vs Compliance. Security and Compliance Work Together.

How Certifications Can Help You Land a Position | Hacking In to Cybersecurity

Linux Academy

Welcome to Hacking In to Cybersecurity, an all-new series dedicated to helping you, the reader, get a leg up on the competition when trying to break into the cybersecurity career field. The blogs will consist of introducing you to some techniques you can use to help to land a security position, as well as covering some concepts that anyone considering joining the career field should know about. How Hiring Managers Find the Best Candidates for a Cybersecurity Position.

Don’t Forget Victimology as a Cybersecurity Strategy

SecureWorks

Technology and IT principles play an undeniable role in cybersecurity defense, but criminological security principles should not be overlooked. Category: Information Security Leadership Insights Technology and IT principles play an undeniable role in cybersecurity defense, but criminological security principles should not be overlooked.

Getting Started with Cloudera’s Cybersecurity Solution

Cloudera Engineering

A quick conversation with most Chief Information Security Officers (CISOs) reveals they understand they need to modernize their security architecture and the correct answer is to adopt a machine learning and analytics platform as a fundamental and durable part of their data strategy.

Hope Is Not a Strategy: Four Lessons ‘Survivor’ Taught Me About Cybersecurity

Tenable

Here are four of my takeaways and how they relate to cybersecurity: 1. These integrated solutions help increase the breadth of visibility across the modern attack surface and foster better collaboration across Security and IT Operations teams.

Games 87

Context Conversations preview: Election security

The Parallax

When it comes to election security, it’s hard not to think of the United States as a proverbial dumpster fire. And while some states are taking steps to secure their voting processes, many are not. Why current funding to secure U.S.

Fostering Public-Private Collaboration on Cybersecurity

Edgewise

Improved cybersecurity communication and collaboration between public and private sector organizations has been a goal—or perhaps a dream—for many years. cybersecurity security strategy threat intelligence sharing

Top 7 Tips for Scaling Your Artificial Intelligence Strategy

OTS Solutions

There Are Top Seven Tips for Scaling Your Artificial Intelligence Strategy. In just the last few years, a large number of enterprises have started to work on incorporating an artificial intelligence strategy into their business.

Israel’s cybersecurity industry is a unicorn. Here’s why

The Parallax

Fewer attendees, perhaps, expected him to reference the Hollywood action movies of Jean-Claude van Damme, who happened to be sitting in the front row for the highest-profile speech of Israel’s largest cybersecurity conference. Cybersecurity is a true blood sport,” Netanyahu quipped.

Implementing GDPR-Aware Security Control

Edgewise

While data privacy is the intended focus of GDPR, one could easily argue that information security has been strengthened through this regulation, as stricter requirements for the protection of personal data are now part and parcel of the law.

Honeypot Security System Strategy

TechTalk

Sweeten your security strategy with a honeypot security system Implementing honeypots and honeynets as part of your network intrusion prevention/detection process We’ve all heard the old saying that you can attract more flies with honey than with vinegar.

Things To Do Right Now About Your Cybersecurity Workforce Crisis

CTOvision

Intel Security has released Hacking the Skills Shortage , a report revealing the current cybersecurity workforce crisis. The shortage in cybersecurity skills has done measurable damage to companies. Additional key findings of the survey include: 82% of respondents reported a shortage of cybersecurity skills. 9 out of 10 respondents say that cybersecurity technology could help compensate for skill shortages. Bob Gourley.

Rise of the Machines: Cybersecurity No Longer Lives in Castles

Edgewise

In cybersecurity, the “castle and moat” analogy has served the community well. The imagery of high walls and wide moats exemplifies network security perimeter models. Data Protection application security cybersecurity zero trust segmentation

Whitelisting, blacklisting, and your security strategy: It's not either-or

TechBeacon

Security, Information Security, Information Security (Info Sec Windows vs. Mac. AWS vs. Azure. Kubernetes vs. Swarm. If you work in IT, these are some of the big decisions you may need to make at one point or another in your career.

Azure 42

Implementing Effective Container Security Strategies

The New Stack

Within this role, he engages with various technical communities to understand how to best solve application security problems. These changes require organizations to adapt their security strategies for a more dynamic production environment. Tim Mackey.

The best patch management strategy for 2019

TechTalk

How do you keep all your systems patched against the never ending onslaught of security vulnerabilities? Patch Central Security antivirus email security patch management patch strategy risk assessmentPatch management causes headaches. Just ask any IT manager or sysadmin!

A guide to modern mobile app development strategy

OTS Solutions

A guide to modern mobile app development strategy. This is informed by the fact that close to 90 percent of the population, which translates to 6 billion people, have access to mobile phones. Here is what you need to know about mobile app development strategy.

Mobile 130

2017 in cybersecurity and privacy news

The Parallax

From rampant ransomware to the Equifax breach to geopolitical machinations, it’s hard not to be a cynic about the past 12 months of security and privacy news. And not all federal cybersecurity decisions this year were necessarily harmful to consumers.

IT/OT Cybersecurity Convergence: Start Strong with These Six Controls

Tenable

As IT and OT teams converge, industrial businesses need to create better cybersecurity plans and strategies to confront modern threats. Try these six cybersecurity controls. . Six Cybersecurity Controls to Help with IT/OT Convergence.

LAN 65

Why a Reactive Security Strategy Costs Companies Millions Each Year

CTOvision

With each new threat, digital security companies are learning to react more quickly and put out countermeasures for these malicious programs, but in the time between a piece of malware’s release into the wild and the release of the solution, it can cost companies a staggering amount of money.

Even The Best Cybersecurity Strategy Is Only Good Once

CTOvision

No matter what the size of your business you should have a cybersecurity strategy. Yes that means if you run a part time business out of your home you need a cybersecurity strategy. And of course that also goes for every other business of every other size small to big. There are plenty of lessons […]. CTO News The Boardroom

We Need A National Cybersecurity Strategy That Everyone Can Implement

CTOvision

In a few months we’ll have a new Administration in Washington and a chance to update our national security policies. So it’s good time to reflect on what we might want to do differently for cybersecurity. A quick search on the Internet will reveal many national cybersecurity initiatives. The quick answer is that we don’t have a national cybersecurity strategy that everyone can implement. A national cybersecurity strategy is well within our reach.

The What and Why of a Unified Security Strategy

The New Stack

These days, you have no shortage of options and strategies to choose from when deploying an application. That is why it’s useful to embrace the concept of a unified security strategy. This means putting in place the tools and processes you need to secure any and all environments.

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk

CTOvision

Cybersecurity is one of the most high-profile topics for organizations today and one of their biggest sources of risk. Conducting a holistic review of the organization to identify areas of vulnerability and improve network security is a proactive measure that no organization should overlook.

How architecture evolves into strategy

O'Reilly Media - Ideas

A look at the roles of architect and strategist, and how they help develop successful technology strategies for business. Before we do that, though, let's cover some historical context that informs how we think of the role. Adding security reduces performance.

Domains of Cybersecurity : A Brief Overview | Hacking into Cybersecurity

Linux Academy

Welcome back to the Hacking into Cybersecurity series. In our previous posts, we’ve focused more on helping you land a cybersecurity position. Here, we’re going to talk about one of the major topics we previously mentioned in passing: the domains of cybersecurity. Something we see happen in most organizations is that the domains are split into different departments under the security umbrella. Think of all the security measures they put in place.

Here Are the Top Cybersecurity Insights for Public Sector

Tenable

A new global study conducted by Ponemon Institute explores cyber risk in the public sector: What are the top priorities for public sector cybersecurity leaders in 2019? Cybersecurity in public sector: five insights you need to know. High schools teach information security courses.

Inform Your Cybersecurity Strategy With Lessons From July 1861

CTOvision

CTO Cyber Security Cyber War Internet of Things News smart cityWhen I was the Director of Intelligence for DoD's first joint cyber defense organization (JTF-CND) our Commander (At the time, Army Major General Dave Bryan) and our J5 (Marine LTC Mike Davis) organized a visit for the senior staff to the Manassas Battlefield Park of Virginia. The purpose was not just team building, but to [.].

Six Security Strategy Tips for Your SME

Strategy Driven

To ensure that your SME is protected from security threats, there are various strategies that you can implement. Staying ahead of the latest security development in your field is essential, and could help to ensure your company has a future. Network Security.