Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISOs Need to Speak the Language of Board Members

"I understand the pitfalls of cyber security, but my boss just won't support me with the budget I need.” Does this sound familiar to you as a CISO? I have 3 pieces of advice for you: Speak their language I like to say that CISOs are from Mars, while CEOs and board members are from Venus. It’s because they don't speak the same language. You might go to your board and say, “I installed Akamai Prolexic.1.4.4.3.1./24 subnet to mitigate an SYN flood attack.”

Coffee Talk with SURGe: Signal Numbers Exposed, FTC Data Privacy Rules, Conti Ransomware, E2EE

Grab a cup of coffee and join Ryan Kovar, Mick Baccio, and Audra Streetman for another episode of Coffee Talk with SURGe. This week they discussed Signal's response to the Twilio breach, the FTC's effort to create new data privacy rules, and a $10 million reward for information about a suspected Conti ransomware operator.

Machine Learning, AI & Cyber Security Part 1: Used for Good

Welcome to another episode of Razorwire Podcast! We are joined today by Oliver Rochford of Securonix and Jonathan Care, a mentor of mine who specialises in cyber security and fraud detection. As AI and its application in cyber security are such a big topic, this podcast will be in two parts. We will discuss machine learning and artificial intelligence for information security in the first part of our discussion today.

Managing Work-Life Balance as a Founder

Here are 3 tips for founders and CEOs to have a work-life balance: As a founder/CEO, there are always 500 more things you could do at the end of the day, the next day, and the day thereafter. So you’ve to ask questions like:“What can I do that will deliver 10x results?”“What can I do to move the needle the most?”“What areas will the results be the same unless I get involved?” Before each day starts, I ask myself, “What are the top few things I need to accomplish?”

Black Hat 2022: The CVSS Fallacy - can you trust the world's most popular vulnerability metric?

The NVD defines one of the usages of CVSS as “a factor in prioritization of vulnerability remediation” and it is the current de-facto vulnerability metric, often seen as infallible guidance and a crucial element in many compliance processes. In our session we will go over real-world CVE examples, demonstrating cases and entire categories where CVSSv3.1 falls short of providing an accurate assessment, both due to its design and its various mishandlings. The session will also touch upon specific indicators in the CVE description that can raise the confidence in a CVSS score, and vice versa.

Changing Your Passwords

Long, randomly generated passwords that are created for each of your logins helps to protect your accounts from cybertheft and account takeover. Keeper’s Password Generator can create and securely store a strong, unique password for each of your sites and apps with the click of the dice. Be sure to refer to a website’s password requirements when creating a new password. You can adjust a password's characters to meet a site’s unique requirements by dragging the slide bar left and right and utilizing the character type check boxes.