How CISOs break down complex security challenges

The role of the CISO has evolved into a critical position that encompasses many responsibilities aimed at safeguarding digital assets, preserving data integrity, and mitigating cyber threats. In essence, the role of the CISO is a complex and ever-evolv… Continue reading How CISOs break down complex security challenges

How to prevent and prepare for a cyber catastrophe

Ransomware and data leaks are inconvenient and costly. But what about a cyber incident that leads to mass casualties?  The notion of “black swan” events — incidents that are so rare and unusual they cannot be predicted —  is a “fallacy”, according to Sarah Armstrong-Smith, Chief Security Advisor at Microsoft, during her talk at UK […]

The post How to prevent and prepare for a cyber catastrophe appeared first on Security Intelligence.

Continue reading How to prevent and prepare for a cyber catastrophe

Navigating generative AI risks and regulatory challenges

The mass availability of generative AI, such as OpenAI’s ChatGPT and Google Bard, became a top concern for enterprise risk executives in the second quarter of 2023, according to Gartner. A benchmarked view of emerging risks “Generative AI was the secon… Continue reading Navigating generative AI risks and regulatory challenges

What to know about FedRAMP Rev. 5 Baselines

In this Help Net Security video, Kaus Phaltankar, CEO at Caveonix, discusses how the recent approval of the FedRAMP Rev. 5 Baselines is a significant step forward in the cloud security and compliance domain. The implications for CSPs and third-party as… Continue reading What to know about FedRAMP Rev. 5 Baselines

Inspiring secure coding: Strategies to encourage developers’ continuous improvement

In software development, the importance of secure coding practices cannot be overstated. Fostering a security culture within development teams has become crucial to ensure the integrity and protection of digital systems. To delve deeper into this topic… Continue reading Inspiring secure coding: Strategies to encourage developers’ continuous improvement

CISO perspective on why Boards don’t fully grasp cyber attack risks

Due to their distinct perspectives, Board members and CISOs often have differing views on cyber attack risks. The discrepancy arises when Boards need cybersecurity expertise, need help comprehending technical jargon, or when CISOs need to communicate i… Continue reading CISO perspective on why Boards don’t fully grasp cyber attack risks

ChatGPT’s unknown potential keeps us guessing

An overwhelming number of respondents familiar with ChatGPT were concerned about the risks it poses to security and safety, according to Malwarebytes. They also don’t trust the information it produces, and would like to see a pause in development… Continue reading ChatGPT’s unknown potential keeps us guessing

How to Manage Cyber Risk During Mergers and Acquisitions

By attracting attention from threat actors, merger and acquisition (M&A) events are a significant source of cyber crime risk. So much so that, according to a 2020 IBM Institute of Business Value study, more than one in three executives said they experienced data breaches that can be attributed to M&A activity during integration. Security ratings, […]

The post How to Manage Cyber Risk During Mergers and Acquisitions appeared first on Security Intelligence.

Continue reading How to Manage Cyber Risk During Mergers and Acquisitions

Preparing health systems for cyber risks and insurance coverage

Our healthcare systems are at risk of infiltration by threat actors, potentially disrupting services, compromising sensitive data, and even jeopardizing patient outcomes. Among the people addressing these challenges is Dennis Fridrich, VP of Cybersecur… Continue reading Preparing health systems for cyber risks and insurance coverage

ChatGPT and data protection laws: Compliance challenges for businesses

In this Help Net Security interview, Patricia Thaine, CEO at Private AI, reviews the main privacy concerns when using ChatGPT in a business context, as well as the risks that businesses can face if they betray customers’ trust. Thaine also discus… Continue reading ChatGPT and data protection laws: Compliance challenges for businesses