Cybersecurity in the Boardroom: A Strategic Driver for Growth comforteMarch 13, 2024097 views Cybersecurity has struggled for many years to make it onto the boardroom agenda. The perception of it as a purely technology function with limited strategic importance has led many organizations to take a short-term, check-box approach to managing cyber risk. This grossly undervalues the role cyber can and should have. In fact, one 2023 study finds that half (51%) of global business decision makers (BDMs) still consider “it a necessary cost but not a revenue contributor,” while 38% see it as a barrier rather than a business enabler.… Read more
ETI-NET and XYPRO Enhance the Digital Resilience of HPE NonStop Systems ETI-NETMarch 13, 2024097 views Expanding on their leadership positions in HPE NonStop Backup Storage Management and Cybersecurity Threat Detection, the latest partnership delivers enhanced levels of HPE NonStop digital resiliency. ETI-NET, the leading provider of HPE NonStop backup systems data and monitoring management, and XYPRO Technology, the leading provider of HPE NonStop Cybersecurity and Compliance software, have established a new level of partnership to enhance digital resiliency.… Read more
Welcome to the Era of BadGPTs Belle LinMarch 11, 20240136 views A new crop of nefarious chatbots with names like “BadGPT” and “FraudGPT” are springing up on the darkest corners of the web, as cybercriminals look to tap the same artificial intelligence behind OpenAI’s ChatGPT. Just as some office workers use ChatGPT to write better emails, hackers are using manipulated versions of AI chatbots to turbocharge their phishing emails.… Read more
2024 Top 5 Cybersecurity Predictions XYPRO TeamFebruary 29, 2024048 views Steve Tcherchian, CISSP, PCI-ISAChief Product OfficerXYPRO Technology Corporationhttps://www.linkedin.com/company/xyprolinkedin.com/in/stevetcherchian 2024 promises to be a year marked by unprecedented challenges and innovations. Picture this: a bustling metropolis where the heartbeat of daily life synchronizes with the hum of digital connectivity. Now, imagine the sudden jolt when schools, utilities, critical infrastructure, entertainment giants, financial institutions, and your vacation destination all find themselves under siege by malicious hackers, disrupting the rhythm of normalcy.… Read more
Cyber hygiene can combat security threats posed by quantum computing Rob JenksAugust 13, 20230264 views But more than two decades later, is this level of cyber hygiene enough? Read more
13 go-to podcasts that inspire IT industry leaders today Linda RosencranceJuly 13, 20230240 views From the most up-to-date tech and cybersecurity news to interviews with top female technology leaders, Read more
The 3 Traits of Successful Cyber Security Leaders JC GallardJuly 13, 20230252 views Here is why successful cyber security leaders have to be trusted business insiders. Read more
KaaS Series: Cyber Security Mesh Architecture (CSMA) Liz LovelaceMay 5, 20230291 views EXPERT WEBINAR SERIES: CSMA represents a significant shift away from traditional perimeter-based security models and towards a more decentralized approach. Read more
Are we on the path to a National Data Privacy Law? Stan WissemanOctober 16, 20220492 views For years, US lawmakers have avoided making tough calls about what data privacy protections we should give consumers and how they should be enforced. That finally may be changing. Last week, the US House Energy and Commerce Committee greenlit a watershed privacy bill that strikes compromises on a series of major issues that have long vexed congressional negotiators. It marks the first time a federal consumer privacy bill has made it out of a US congressional committee, a historic feat.… Read more
The Struggle with Threat Intelligence Kevin SwanOctober 16, 20220554 views Driven by a vast majority of security professionals who consider cyber threat intelligence a valuable resource in finding and dealing with security threats, the adoption of threat intelligence services and capabilities continues to take off. Yet, security analysts continue to slowly adopt the technology needed to make better use of threat data. In fact, “taking advantage of cyber threat intelligence” represented one of the top security challenges for nearly 30% of respondents according to the 2021 State of Security Operations Report published by CyberRes.… Read more