Most CISOs feel unprepared for new compliance regulations

With the new stringent regulations, including the SEC’s cybersecurity disclosure rules in the USA and the Digital Operational Resilience Act (DORA) in the EU, a significant challenge is emerging for many organizations, according to Onyxia Cyber. CISO r… Continue reading Most CISOs feel unprepared for new compliance regulations

Banking, oil and IT industry reps call on Congress to harmonize cyber regulations … again

Industry representatives in a House hearing pointed to the Biden administration’s cyber reporting mandate as an example of overlapping regulations.

The post Banking, oil and IT industry reps call on Congress to harmonize cyber regulations … again appeared first on CyberScoop.

Continue reading Banking, oil and IT industry reps call on Congress to harmonize cyber regulations … again

How CISOs enable ITDR approach through the principle of least privilege

Somewhere, right now, a CISO is in a boardroom making their best case for stronger identity threat detection and response (ITDR) initiatives to lower the risk of intrusion. For a good reason, too: Look no further than the Change Healthcare breach, wher… Continue reading How CISOs enable ITDR approach through the principle of least privilege

Cross-industry standards for data provenance in AI

In this Help Net Security interview, Saira Jesani, Executive Director of the Data & Trust Alliance, discusses the role of data provenance in AI trustworthiness and its impact on AI models’ performance and reliability. Jesani highlights the collabo… Continue reading Cross-industry standards for data provenance in AI

CDK hack shows SEC disclosure standards are unsettled

The early application of the regulatory agency’s new cybersecurity reporting rules reveal that materiality is in the eye of the beholder.

The post CDK hack shows SEC disclosure standards are unsettled appeared first on CyberScoop.

Continue reading CDK hack shows SEC disclosure standards are unsettled

Discover the growing threats to data security

In this Help Net Security interview, Pranava Adduri, CEO at Bedrock Security, discusses how businesses can identify and prioritize their data security risks. Adduri emphasizes the necessity of ongoing monitoring and automation to keep up with evolving … Continue reading Discover the growing threats to data security

Top priorities for compliance leaders this year

Legal, compliance and privacy leaders list strengthening their personal impact on company strategy as their top priority for 2024, according to Gartner. Improving third party risk management (TPRM), and ensuring compliance programs can keep pace with f… Continue reading Top priorities for compliance leaders this year

Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella

Microsoft is suffering cybersecurity failures due to systemic problems with strategic leadership. The world is witnessing an alarming trend of cybersecurity issues with Microsoft products and services. Over the past several years, Microsoft has suffere… Continue reading Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella

From passwords to passkeys: Enhancing security and user satisfaction

In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data breaches and improves user experience by simplifying the login process. Lamb also addresses the … Continue reading From passwords to passkeys: Enhancing security and user satisfaction

Enhancing security through collaboration with the open-source community

In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and maintaining open-source tools, and brings out the potential risks and benefits of collaborating with the open-source community … Continue reading Enhancing security through collaboration with the open-source community