Firmware is the little-talked-about component of every digital device and computer system, that possesses tremendous control, and is now being targeted by cyber attackers. In today’s Cybersecurity Insights podcast, I am talking with Scott Scheferma
Firmware is the little-talked-about component of every digital device and computer system, that possesses tremendous control, and is now being targeted by cyber attackers. In today’s Cybersecurity Insights podcast, I am talking with Scott Scheferma
We're talking about the latest Java-based vulnerability CVE-2021-44228. Recently, a critical Zero-day vulnerability has been found in log4j which permits Remote Code Execution (RCE) allowing the attackers to get remote access. The Vulnerability got
Apache log4j 2 is an open source Java-based logging framework, which is leveraged within numerous Java applications around the world. Compared with the original log4j 1.X r
CISO Contributors
Panel Discussion (Rec
In this talk it present never before seen data on on the first three quarters of 2021. The cybersecurity industry is booming with record levels of funding, growing attacks, and massive hiring. At the same time, some companies are failing to thrive.
Our editorial team has handpicked the best talks at Discussion Summit - a small community summit where we aim to find out the problems and solutions currently faced in the cyber security industry. This talks is on 'Iranian Nationwide Terror And Intel
As we continue to move forward in the Industry 4.0 era of greater connectivity between the physical and digital, the promise and development of smart cities become a more likely vision. Keeping a smart city secure is a challenge as the urban safety e
Topic Brief
We already talked about developing a modern security operations center or a SOC and some of you were left with questions how do you actually journey ? how do you travel to this modern SOC ? It's easy to discuss what the modern SOC should
AI tech is a powerful tool. The original photo (left) was cleaned-up with an AI deep learning algorithm (Image source: from Murilo Gustineli) and restoring tremendous clarity.
The AI researchers outline their progress in their white paper Towards Real
Keynotes From World-Renowned Industry Experts (Best Of The World) :
I recently presented to a small group on why cybersecurity is becoming more difficult over time, despite all the money and effort that is being applied. Sharing a replay of the presentation where I discuss cybersecurity history, root causes, shifting
I like the concept of ‘banning’ the sale of offensive cyber weapons to potential adversaries, but what defines technology as offensive versus defensive?
Israel just announced it will ban the sales of hacking and surveillance tools to 65 countries: htt
The cybersecurity industry had challenges with bringing in new blood and facilitating the career growth. Misinformation has unfortunately played a part in making various roles appear unattainable, when we should be doing the opposite. We should be
A new bill has been proposed to address Ransomware. Congressman Patrick McHenry recently introduced the Ransomware and Financial Stability Act of 2021.
I believe it is the right direction for undermining ransomware attac
Recently introduced Ransomware and Financial Stability Act (H.R.5936) is the right direction for undermining ransomware attacks, by disallowing payments, but it just does not go far enough. This proposal only benefits traditional financial institutio
One of the greatest challenges for a cybersecurity leader is to convey the present digital risks upward to the c-suite and Board of Directors. Representing to executive leadership the value of security, which protects the organization’s assets, reput
The 2021 Front Lines cybersecurity conference brought together a panel to discuss the challenges faced by the industry with growing security threats and far too cybersecurity professionals to combat them. The “Closing the Cyber Skills Gap” panel feat