How CISOs Enable ITDR Approach Through the Principle of Least Privilege

Least privilege begins by addressing dormant user accounts and then scrutinizing access privileges, using Context-based access control (CBAC), Attribute-based access control (ABAC), and Role-based access control (RBAC) to determine user access.

ChatGPTriage: How can CISOs See and Control Employees’ AI Use?

Building a database of AI destinations and capturing employee activity are essential steps in gaining visibility. Monitoring user prompts, responses, and data exchanged with AI models is crucial for understanding employee behavior.

Risk Related to Non-Human Identities: Believe the Hype, Reject the FUD

The hype surrounding non-human identities (NHIs) has recently increased due to the risk they pose, with breaches causing fear, uncertainty, and doubt. With NHIs outnumbering human identities, the associated risks need to be addressed.

Diversifying Cyber Teams to Tackle Complex Threats

A diverse workforce brings different perspectives, experiences, and problem-solving approaches to the table, enabling teams to identify vulnerabilities and develop more robust defense strategies.

The Impossibility of “Getting Ahead” in Cyber Defense

The nature of defense is inherently stacked against defenders, as cybercriminals aim to disrupt systems while defenders manage complex tech stacks. Additionally, the rapid evolution of technology means defenders are always playing catch-up.

Preparing for Q-Day as NIST Nears Approval of PQC Standards

Q-Day, the day when a quantum computer can break modern encryption, is approaching rapidly, leaving our society vulnerable to cyberattacks. Recent advancements in quantum technology suggest that Q-Day is coming sooner than expected.

Is the Cybersecurity Industry Ready for AI?

AI is not new to cybersecurity, but generative AI is causing concern as it impacts organizations. A study found that AI-generated threats have already affected 75% of organizations, yet 60% are not prepared to handle AI-based attacks.

Meta, MS SQL Make Strange Bedfellows on Couch of Cyber-Pain

The article discusses how Meta and Microsoft SQL Server, two very different parts of the tech industry, are both facing issues related to software and services supply chain.

Will Upcoming HHS Cyber Regs Move Needle in Health Sector?

Hospitals are expected to be the first entities required to implement new "minimum" mandates based on cybersecurity performance goals released by the Department of Health and Human Services (HHS) in January.

How to Create Your Cybersecurity “Google Maps”: A Step-By-Step Guide for Security Teams

Just as Google Maps transformed navigation, process mapping can provide a comprehensive view of defenses, people, and processes in cybersecurity. Once the map is in place, it can be used to optimize security processes.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags