From the Winter 2023 Issue

CISOs: Top 5 Strategies to Get Ready for the Quantum Threat

Author(s):

Skip Sanzeri, FOUNDER and COO, QuSecure, Inc.

Quantum Threats

Quantum computers are very powerful machines that utilize subatomic properties offering humanity an amazing advancement to solve many unsolvable problems. Unfortunately, quantum computers are very good at breaking the existing cybersecurity the world uses today. In short, quantum computers will threaten our data and privacy to the extent that this will force the largest technology … Read more

From the Winter 2023 Issue

When It Comes To SAP, Don’t Be A “SOAR” Loser

Author(s):

Christoph Nagy, CEO, SecurityBridge

SAP - SOAR

Irrespective of whether you are starting your career in information security or have years of experience in this field, you might realize that you are part of an unfair game. Why is that? An army of attackers composed of kids, organized crime, and nation-state hackers are coming after your information. However, most companies need more … Read more

From the Winter 2023 Issue

Level-up API Protection with Identity and Centralized Trust

Author(s):

Gary Archer, Product Marketing Engineer, Curity

Level-up-API

Introduction API security has matured over the years, and the best practice has moved away from older security methods such as API keys. Token-based authentication is the norm, but too often, a significant concern is overlooked: identity. An identity focus is critical for modern APIs to mitigate risk and prevent cyber-attacks. In this article, we … Read more

From the Winter 2023 Issue

How K-12 Schools Can Confidently Protect Digital Identities

Author(s):

Michael Webb, Chief Technology Officer, Identity Automation

K-12 Schools Digital Identities

Data heavy and often highly vulnerable, the K-12 education sector provides a broad surface area for exploitation by sophisticated and novice hackers alike. Increasingly targeting all varieties of schools – large and small, urban and rural, public and private, cybercriminals seek out fast financial gain by gaining access to the highly sensitive personal data of … Read more

From the Winter 2023 Issue

The New Threat Surface: Employee-Targeted Digital Risks

Author(s):

Amir Tarighat, Co-Founder and CEO, Agency

The New Threat Surface

In the last decade, the enterprise cybersecurity ecosystem has rapidly grown to address new threats. Overall, it has become highly effective. Businesses have benefited from a veritable army of professionals and cutting-edge technology to secure their systems, forcing bad actors to evolve their strategies. As corporate devices and networks are increasingly well-hardened, cybercriminals have begun … Read more

From the Winter 2023 Issue

Teaching Kids How to Hack

Author(s):

Alex Haynes, CISO , IBS Software

Teaching Kids How to Hack

Many industry professionals bemoan the lack of qualified candidates within information security and resource scarcity is a common issue for many companies. According to latest estimates and depending which numbers you follow, there is a potential shortfall of up to one million cybersecurity professionals globally and this is just getting worse. Granted, geo-political issues like … Read more

From the Winter 2023 Issue

A Wrinkle in Metaverse

Author(s):

Carmen Marsh, President and CEO, United Cybersecurity Alliance

A Wrinkle in Metaverse

The metaverse is the latest and coolest technology designed to let us experience things in the virtual world, using Virtual Reality and Augmented Reality (AR/VR) tools. However, it also presents us with a plethora of security challenges. Is this modern technology creating a “wrinkle” for bad actors to access our “Meta” world and exploit it? … Read more

From the Winter 2023 Issue

Burnout in Cyber-Attack Experts

Author(s):

Usman Choudhary, Chief Product Officer, VIPRE Security Group

Burnout in Cyber-attack experts

Human error has long been one of the most critical cybersecurity risks. Now burned-out employees might be the newest threat continuing to face businesses in the months ahead. Businesses must tackle this issue head-on and prioritize their employees’ well-being, investing in the proper cybersecurity training and support. According to research firm Gartner, cybersecurity leader’s today are … Read more

From the Winter 2023 Issue

Writing Effective Policies for CMMC 2.0 Compliance

Author(s):

Guy M. Bilyou, Cybersecurity Lead / ArCybr Lead Assessor, ArCybr

writing-cmmc-2-policies

Wading through a CMMC 2.0 assessment preparation can remind one of driving through a thick fog with obstacles and hazards appearing and mere seconds to react. One way to cut through the fog of preparation is a technique that involves the writing and revising of policies and procedures based on a well-organized System Security Plan … Read more