recentpopularlog in

jonerp : hackers   4

Time for cybersecurity to take back control of its story
"A need to address the talent gap and burn-out were also part of Ghai’s message. When it comes to bringing in new talent Ghai said: “It’s time to shift from elitism to inclusion.” Many HR teams dump CVs for cybersecurity roles, even junior ones, if people don’t have the right letters and awards. They often ignore experience. Think that isn’t true? Go and ask the community. Many of the cybersecurity communities I sit in talk continuously about the problem of getting a foothold because they haven’t done the courses HR thinks are requirements."
latest  news  security  change  culture  cybersecurity  hackers  mental  health  narrative  neurodiversity  rsa  story  veteransec 
5 weeks ago by jonerp
7 Signs It’s Time To Get Focused On Zero Trust
"69% of employees doubt the cybersecurity processes in place in their organizations today. When the majority of employees don’t trust the security processes in place in an organization, they invent their own, often bringing their favorite security solutions into an enterprise. Shadow IT proliferates, productivity often slows down, and enterprise is more at risk of a breach than ever before. When there’s no governance or structure to managing data, cybercriminals flourish."
business  featured  posts  technology  software  trends  &  concepts  breach  breaches  centrify  cybersecurity  hackers  louis  columbus'  blog  passwords 
november 2019 by jonerp
Three Reasons Why Killing Passwords Improves Your Cloud Security
"The Twitter CEO’s account getting hacked is the latest in a series of incidents that reflect how easy it is for hackers to gain access to cloud-based enterprise networks using mobile devices. Verizon’s Mobile Security Index 2019 revealed that the majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device. Mobile devices are one of the most porous threat surfaces a business has. They’re also the fastest-growing threat surface, as every employee now relies on their smartphones as their ID. IDG’s recent survey completed in collaboration with MobileIron, titled Say Goodbye to Passwords found that 89% of security leaders believe that mobile devices will soon serve as your digital ID to access enterprise services and data."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  hackers  jack  dorsey  louis  columbus'  blog  mobileiron  twitter  hack  zero  trust  networks 
september 2019 by jonerp
Marriott data breach shows cyber security risks of mergers
"The company also admitted that the information also includes payment card numbers and payment card expiration dates. While it claims the payment card numbers were encrypted using Advanced Encryption Standard encryption (AES-128) it also admits that the keys to decrypt those payment cards may also have been stolen. If so, this makes the breach significantly worse as it shows the hackers had complete access to all company information."
latest  news  security  data  breach  due  diligence  forrester  gdpr  hackers  ico  m&a  marriott  nominet  starwood 
december 2018 by jonerp

Copy this bookmark:

to read