Security
Cover Your Assets: The Difficulties of Securing IoT
By Aaron Weismann, Chief Information Security Officer, Main Line Health Securing the biomedical Internet of Things (IoT) in healthcare is ...
From Gatekeepers to Strategists: How CISOs Can Lead the Cybersecurity Evolution
By Carmine Valente, CISSP | CISM | CISA, Vice President of Information Security at Paramount Global Recently, we have seen a ...
Smart grid security: Ensuring the security and privacy of information transmitted and stored in smart grid systems
Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce The energy landscape is transforming significantly, with smart ...
The U.S. Acts to Prevent Kaspersky from Becoming a Cyber Trojan Horse
By Carlos G. Sháněl, Director, Center for Cybersecurity Studies, Casla Institute The Biden administration announced on June 20th an immediate ...
Insights on Cyber-Security, Prevention, and Preparation
By Faris Faris, Chief Information & Technology Officer, Distribution & Supply Chain Systems Expert In my role as CIO/CTO, I ...
Guarding the Dragon’s Den: Local Government Mitigation for today’s targeted Critical Infrastructure
By Dr. Brian Gardner, Chief Technology & Information Security Officer, City of Dallas Recently, FBI Director Wray testified before a ...
Blue, Red, and Purple Approach
By Carmine Valente, CISSP | CISM | CISA, Vice President of Information Security at Paramount Global In the past decade, ...
The Challenges Amongst Cybersecurity, Privacy, and Artificial Intelligence
By Shefali Mookencherry, Chief Information Security & Privacy Officer, University of Illinois Chicago Just the other day, I was reading ...
The Evolution and Importance of Cybersecurity in the Digital Age
By Jeffery Squibb, Information Security Administrator/Infrastructure Lead, SoutheastHEALTH In an era where the digital landscape is continuously evolving, Cybersecurity has ...
Redefining Cyber Risk for Modern Information Security Programs
By Lester Godsey, Chief Information Security Officer, Maricopa County The following is the definition of cyber risk, per ChatGPT: “ ...
Regionalization of Cyber Security Defense
My Experience as Regional Cyber Security Chief for the US Army Regional Network Center By Gary Trautmann, Senior Cyber Security ...
A Dive Into The TPRM Landscape
By Carmine Valente, CISSP | CISM | CISA, Vice President of Information Security at Paramount Global Corporate organizations have historically ...
What does a one-device policy mean to you?
By Todd Broccolo, Senior Director - Head of Workplace Technology Engineering & Operations, First Republic In the last few years, ...
Ukraine’s Battle against Russian Cyber Aggression
By Carlos G. Sháněl, Director, Center for Cybersecurity Studies, Casla Institute In the first week of January 2024, hackers allegedly ...
Measuring Control Efficacy: Time for Metrics and not “Meh”-trics
By Christopher Frenz, Information Security Officer/AVP of IT Security, Mount Sinai South Nassau Almost everyone in the security industry will, ...
The Future of Water: Technology Innovations in the Water Sector
By Cynthia Baughman, Water Utilities Technology Director, City of Garland Water is a necessity for sustaining human life. Water is ...
Navigating the Digital Minefield: The Perils of Personal Identifiable Information
By Marquese Davis, Heathcare IT Executive In today's interconnected world, the sanctity of Personal Identifiable Information (PII) stands at the ...
Securing Tomorrow: The State of Cybersecurity in the Financial Services Sector
By Randall Jackson, Chief Information Security Officer – Income Research + Management Introduction In an era dominated by digital transactions ...
U.S. Companies Need More Authority to Open Covert Channels to Deter IP Theft
By V.S. Subrahmanian, Walter P. Murphy Professor of Computer Science; Buffet Faculty Fellow, Northwestern University This past Friday, November 3, ...
Exploring Risk Assessment and Management, Challenges, Emerging Technology and Multilayered Defense
By Othello Dixon, Information Security Officer, Virginia Department of Health Risk Assessment & ManagementRisk assessment and management aim to reduce, ...
Cybersecurity Challenges in the Age of Generative AI
By David Bader, Distinguished Professor and Director, Institute for Data Science, New Jersey Institute of Technology Cybersecurity professionals will not ...
Changes aren’t permanent, but change is’: Adaptability is crucial to keep up with the evolving world of information security
By Erik Johnson, Director of Reliability Analysis, ReliabilityFirst In the world of information security, we have talked about the increasing ...
High School Cyber Education: The Key to Securing Our Digital World
By Tj Houston, Cyber Security Instructor, Ashland County-West Holmes Career Center Let’s face it, as a society, we are spending ...
Unseen Threats: Local Vulnerabilities and the Strategic Threats Lurking in National Critical Functions
By Charles Harry, PhD, Director, Center for the Governance of Technology and Systems (GoTech), University of Maryland In March of ...
Forging the Future: Elevating Cybersecurity Defense with Analyst Wisdom through Generative AI
By Brennan Lodge, Adjunct Professor, Information Technology & Data Analytics, New York University Cybersecurity professionals have long been embroiled in ...
Tackling Cybersecurity for Medical Devices
By Eddie Myers, Crothall Healthcare Director of Cybersecurity (Healthcare Technology Solutions Division) The rapid digitization of the healthcare industry has ...
Mitigating Cybersecurity Risks in Low Visibility Environments
By Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce Introduction In today's interconnected world, where digital ...
Achieving Data Security and Analytics with AI
By Glenn Schmitz, CISO, Virginia Department of Behavioral Health and Developmental Services In 2020 the world changed when COVID began ...
Enterprise Cyber Resilience: A Leadership Mindset, Business Model, and GRC Framework
By Nick Janka, Chief Cyber Architect, Lockheed Martin I. CYBERSECURITY VS. CYBER RESILIENCE Cyber resilience, when implemented correctly, enables the ...
Data Infrastructure for Analytics in Education
Cary K. Jim, Ph.D., Data & Analytics Manager, The ASSISTments Foundation With the growing interest in migrating information systems to ...
Cyber vs Physical Security: Shouldn’t we take cybersecurity and data privacy as seriously as physical security? WE NEED BOTH!
By Ron Zochalski, CTO & CISO, Lake County Government I have the current rare responsibility of leading building technology and ...
Cybersecurity Risky Business
By Andres Calderon, Cyber Resilience Officer, Centura Health The risk-based approach is a widely adopted method for addressing cybersecurity challenges ...
The Benefits of Having a Growth Mindset in Cybersecurity
By Guy Albertini, Associate Vice President and Chief Information Security Officer, Rutgers University In 2006, Carol S. Dweck set out ...
Cybersecurity and Artificial Intelligence: Enhancing the Cybersecurity Posture.
By Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce Cybersecurity has become a critical topic for ...
A Need for the Cyber Security Strategic Business Partner
By David Stucky, Business Information Security Analyst (Cyber Information Assurance Analyst), Penn State University Information Security’s beginnings are well rooted ...
The Challenge of Retaining Information Security Personnel
By Jeffery Squibb, Information Security Administrator/Infrastructure Lead, SoutheastHEALTH In today's digital era, information security personnel are highly sought-after professionals in ...
Identity in the modern Enterprise
By George Irungu, Former CISO, Summa Health Identity has become the currency of trade in the digital world. It is ...
Three key Types of Security Controls to Consider when Assessing a Data Center
By Guy Albertini, Associate Vice President and Chief Information Security Officer, Rutgers University Data centers are essential to modern businesses, ...
Make Cybersecurity a Team Sport
By Frederick Scholl, Cybersecurity Program Director, Quinnipiac University Last month’s National Cybersecurity Awareness theme was “See Yourself in Cyber”. I ...
The Market Trend in Recruiting vCISO Firms
By Mehran Basiratmand, Chief Information Security, Consultant In the past two years, technology adoption, innovation, and organizational transformation have accelerated ...