Shervin Evans began his career as a programmer but he always knew his future was in cybersecurity. Now, 20 years later as an information security officer, he evangelizes about cybersecurity to employees in his organization, his family and the broader community.
Curiosity is one of the most important traits for success in cybersecurity. Professionals in this field regularly face complex problems that require an inquisitive mind, and gamified, hands-on learning is one of the best ways to develop an inquisitive mindset.
New Mimecast CEO Marc van Zadelhoff talks about the integration of Elevate to manage human risk and the company's strategy for technological innovation. He also details plans for expanding Mimecast's presence in non-English-speaking markets and enhancing channel partnerships.
The United States Coast Guard in recent years has started to offer a range of cybersecurity services designed to enhance protections for the marine transportation system, but a new report reveals private sector stakeholders are reluctant to use the military branch.
To make cybersecurity a business enabler, cybersecurity teams need to focus on opening things up in a secure fashion so that the functionality and productivity of the business can flourish. Hearst's Andres Andreu discusses the areas in which this can be done.
According to Fortinet's latest Global Skills Gap Report, 90% of organizations experiencing a breach in the past year can partially attribute the incident to a lack of cyber skills. Fortinet's Rob Rashotte offers insight on the report and tips for tackling the skills shortage and minimizing enterprise risk.
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense. Join us for a live demonstration of a new-school approach to Security Awareness Training and Simulated Phishing. Find out how 65,000+...
Javvad Malik, lead security awareness advocate at KnowBe4, emphasized the increasing risk posed by threat actors during election cycles - exploiting social media, posting deepfake content and disseminating misinformation. "Be skeptical of everything you see," he said.
Your software cybersecurity competency is under increasing pressure as cyber attackers "up" their games and new compliance regulations shift cyber risk toward device and software manufacturers.
It's time to get ready. Agile, DevOps and IT teams are integral elements of your cybersecurity strategy. Align and...
Lorena Nunes, industrial cybersecurity specialist at Braskem, discusses how to bridge the cultural gap between IT and OT. She emphasizes the importance of building a cybersecurity culture and getting buy-in from leadership and rank-and-file employees.
Increasingly, threat actors are targeting software developers and their code, finding new ways to attack enterprises from within. A new level of security awareness is needed, says Ed Adams, CEO of Security Innovation. And it needs to focus squarely on building cyber resilience.
Human-focused attacks are increasingly sophisticated. Therefore, companies must prioritize their team members' readiness to combat these risks within their cybersecurity measures.
Join an expert in Digital Risk and Email Protection and former Gartner analyst as she explores the effectiveness of a human-centric...
More than two-thirds of breaches involve the human element. Traditional security awareness initiatives, often fixated on training participation and engagements, are inadequate in mitigating incidents triggered by employees' risky behaviors, said Mimecast's Masha Sedova.
Creating and understanding risk profiles for individual users in an organization can help optimize the effectiveness of security awareness training, which is just one tool under the wider umbrella of human risk management, said Ashley Rose, founder and CEO of Living Security.
Security awareness training is maturing as security teams recognize the need to secure the "human element" of cyber risk. But in the face of more sophisticated attacks using MFA bypass techniques, APTs and AI, it's time for organizations to create more tailored education programs.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.