Tag: resilience
-
TDL 007 – Cyber Warriors Digital Shadows: Insights from Canada’s Cybersecurity Leader
Tags: ai, awareness, backup, breach, browser, business, cio, ciso, communications, conference, control, corporate, country, cryptography, cyber, cybersecurity, dark-web, data, data-breach, defense, dns, email, encryption, finance, government, healthcare, identity, incident, infrastructure, intelligence, Internet, jobs, law, leak, linux, malicious, mfa, mitigation, network, organized, phone, privacy, ransom, ransomware, RedTeam, resilience, risk, risk-management, router, service, startup, strategy, supply-chain, switch, tactics, technology, theft, threat, tool, training, windowsSummary In this episode of The Defender’s Log, host David Redekop interviews Sami Khoury, the Senior Official for Cybersecurity for the Government of Canada. With a career spanning 33 years at the Communication Security Establishment (CSE), Khoury shares how a coincidental job application blossomed into a lifelong passion for national security. Khoury emphasizes that modern…
-
Navigating Cybersecurity Partnerships: AI, Resilience, And The Future Of Threat Intelligence With Chari Rhoades Of Proofpoint
Proofpoint’s approach to AI supports both product innovation and internal skill development, helping teams and partners strengthen collaboration and effectiveness. First seen on crn.com Jump to article: www.crn.com/news/security/2025/navigating-cybersecurity-partnerships-ai-resilience-and-the-future-of-threat-intelligence-with-chari-rhoades-of-proofpoint
-
CISOs face quantum leap in prioritizing quantum resilience
Tags: apple, attack, ciso, cloud, computer, computing, crypto, cybersecurity, data, data-breach, encryption, finance, governance, government, Hardware, healthcare, infrastructure, nist, resilience, risk, service, software, supply-chain, technology, threat, vulnerabilityState of migration: Encryption underpins the security of everything from healthcare records to government data and e-commerce transactions.But just 8.5% of SSH servers currently support quantum-safe encryption.TLS 1.3 adoption, currently at 19%, also trails older, quantum-vulnerable versions, according to a recent study by Forescout.Other experts paint a more optimistic picture of PQC deployment since NIST…
-
CISOs face quantum leap in prioritizing quantum resilience
Tags: apple, attack, ciso, cloud, computer, computing, crypto, cybersecurity, data, data-breach, encryption, finance, governance, government, Hardware, healthcare, infrastructure, nist, resilience, risk, service, software, supply-chain, technology, threat, vulnerabilityState of migration: Encryption underpins the security of everything from healthcare records to government data and e-commerce transactions.But just 8.5% of SSH servers currently support quantum-safe encryption.TLS 1.3 adoption, currently at 19%, also trails older, quantum-vulnerable versions, according to a recent study by Forescout.Other experts paint a more optimistic picture of PQC deployment since NIST…
-
CISOs face quantum leap in prioritizing quantum resilience
Tags: apple, attack, ciso, cloud, computer, computing, crypto, cybersecurity, data, data-breach, encryption, finance, governance, government, Hardware, healthcare, infrastructure, nist, resilience, risk, service, software, supply-chain, technology, threat, vulnerabilityState of migration: Encryption underpins the security of everything from healthcare records to government data and e-commerce transactions.But just 8.5% of SSH servers currently support quantum-safe encryption.TLS 1.3 adoption, currently at 19%, also trails older, quantum-vulnerable versions, according to a recent study by Forescout.Other experts paint a more optimistic picture of PQC deployment since NIST…
-
Rethinking Security Resilience And Getting Back To Basics At CornCon 11
CornCon 11 emphasized security basics, real-world risk alignment, and sustainable practices to help teams build resilient programs in today’s complex threat landscape. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/rethinking-security-resilience-and-getting-back-to-basics-at-corncon-11/
-
Rethinking Security Resilience And Getting Back To Basics At CornCon 11
CornCon 11 emphasized security basics, real-world risk alignment, and sustainable practices to help teams build resilient programs in today’s complex threat landscape. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/rethinking-security-resilience-and-getting-back-to-basics-at-corncon-11/
-
Rethinking Security Resilience And Getting Back To Basics At CornCon 11
CornCon 11 emphasized security basics, real-world risk alignment, and sustainable practices to help teams build resilient programs in today’s complex threat landscape. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/rethinking-security-resilience-and-getting-back-to-basics-at-corncon-11/
-
Auto sector faces historic cyber threats to business continuity
A catastrophic cyberattack at Jaguar Land Rover is forcing governments and industrial leaders to address urgent demands for business resilience and accountability. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/auto-sector-cyber-threats-business-continuity/802974/
-
VeeamCloud für MSP erweitert die SaaS-Datenresilienz auf Partner
Veeam Software gab die Verfügbarkeit von Veeam-Data-Cloud (VDC) für Managed-Service-Provider (MSP) im Rahmen des Veeam-Cloud & Service-Provider (VCSP)-Programms bekannt. Die Veeam-Data-Cloud wurde entwickelt, um Drittanbieter zu unterstützen, und bietet branchenführende, zukunftssichere Datensicherung sowie Resilienz über eine sichere, skalierbare SaaS-Plattform für ihre Kunden in verschiedenen Umgebungen. Veeam-Data-Cloud für MSP ist die einfache Lösung für Dienstleister, um…
-
Securing the AI era: Huawei’s cyber security strategy for the GCC
At Gitex 2025, Sultan Mahmood, chief security officer for Huawei Gulf North, outlined how the company supports GCC digital sovereignty, AI security, and enterprise cyber resilience First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366632856/Securing-the-AI-era-Huaweis-cyber-security-strategy-for-the-GCC
-
Securing the AI era: Huawei’s cyber security strategy for the GCC
At Gitex 2025, Sultan Mahmood, chief security officer for Huawei Gulf North, outlined how the company supports GCC digital sovereignty, AI security, and enterprise cyber resilience First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366632856/Securing-the-AI-era-Huaweis-cyber-security-strategy-for-the-GCC
-
Von Prävention zu Resilienz: Cyber-Resilienz beginnt am Endpoint
Der Endpoint ist oft der erste Angriffspunkt und die beste Chance, Angriffe zu stoppen. Eine moderne Plattform erweitert diesen Schutz nahtlos auf E-Mail, Netzwerk, Cloud und Identitäten. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/von-praevention-zu-resilienz-cyber-resilienz-beginnt-am-endpoint/a42384/
-
Vier Fragen entscheiden über mehr Cyber-Resilienz
Die Mehrheit der Unternehmen weltweit setzt inzwischen Lösungen zum Schutz ihrer Endpunkte ein. Branchenweit wird dafür mit ähnlichen Schlagwörtern wie ‘KI-gestützt”, ‘Next-Gen” oder ‘integriert” um Aufmerksamkeit gebuhlt. Doch es bestehen erhebliche Unterschiede, insbesondere wenn Unternehmen von reiner Prävention zu strategischer und ganzheitlicher Detection & Response übergehen, um die Resilienz zu stärken. Dass Resilienz ein Top-Thema…
-
APIContext Appoints Lelah Manz as Board Chair To Accelerate Company Growth
APIContext, the leader in machine-first resilience monitoring, has appointed Lelah Manz as Chair of its Board of Directors. Manz previously served as Senior Vice President and General Manager of Data and Shared Services at Akamai Technologies, where she led a global team delivering data, AI, and shared platform capabilities. Over her nearly two-decade tenure at…
-
Preparing for the Post-Quantum Cryptography Shift
Point Wild’s Zulfikar Ramzan Says Cryptography Is Crucial Against Quantum Risks. Cyber resilience is a critical part of defense strategies today, and resilience is rooted in strong, well-managed cryptography, said Zulfikar Ramzan, chief technology officer at cybersecurity firm Point Wild. He shares key drivers for organizations to move toward quantum migration. First seen on govinfosecurity.com…
-
NCSC warns companies to prepare for a day when your screens go dark
The UK’s National Cyber Security Centre warns that the country now faces four nationally significant cyberattacks every week – a 129% jump in a year. Some headlines claim the NCSC is urging organisations to “go back to pen and paper,” but the full report tells a more practical story about resilience, preparedness, and surviving a…
-
NCSC warns companies to prepare for a day when your screens go dark
The UK’s National Cyber Security Centre warns that the country now faces four nationally significant cyberattacks every week – a 129% jump in a year. Some headlines claim the NCSC is urging organisations to “go back to pen and paper,” but the full report tells a more practical story about resilience, preparedness, and surviving a…
-
NCSC warns companies to prepare for a day when your screens go dark
The UK’s National Cyber Security Centre warns that the country now faces four nationally significant cyberattacks every week – a 129% jump in a year. Some headlines claim the NCSC is urging organisations to “go back to pen and paper,” but the full report tells a more practical story about resilience, preparedness, and surviving a…
-
Zero Trust und Quanten-Resilienz – Was sichere Netzwerke für KI wirklich brauchen
First seen on security-insider.de Jump to article: www.security-insider.de/was-sichere-netzwerke-fuer-ki-wirklich-brauchen-a-c813a1deed621128ef418e9097cc19d5/
-
Unsupported OpenJDK in Financial Systems: Hidden Risks
Summary Financial institutions using Java can remain compliant with the EU’s DORA security framework with a secure, supported and stable Java platform. For this reason, all the world’s top 10 trading companies and six of the top 10 U.S. financial firms have switched to Azul. In this post you will learn: The EU’s Digital Operational Resilience Act (DORA) is a……
-
Resilience Engineering: Britische Unternehmen sollen Notfallpläne entwickeln
Die britische Regierung empfiehlt Unternehmen, Vorkehrungen für den Fall einer Cyberattacke zu treffen – mit Stift und Papier. First seen on golem.de Jump to article: www.golem.de/news/resilience-engineering-britische-unternehmen-sollen-notfallplaene-entwickeln-2510-201150.html
-
Resilience Engineering: Britische Unternehmen sollen Notfallpläne entwickeln
Die britische Regierung empfiehlt Unternehmen, Vorkehrungen für den Fall einer Cyberattacke zu treffen – mit Stift und Papier. First seen on golem.de Jump to article: www.golem.de/news/resilience-engineering-britische-unternehmen-sollen-notfallplaene-entwickeln-2510-201150.html
-
Vom CISO zum Chief Risk Architect
Tags: ai, business, ceo, ciso, cyber, cyberattack, cyersecurity, dora, finance, firewall, germany, incident response, nis-2, resilience, risk, risk-assessment, risk-management, supply-chain, technology, update, vulnerabilityDer moderne CISO wird zum Chief Risk Architect.Jahrelang waren CISOs im Maschinenraum der IT tätig und konzentrierten sich auf die Einhaltung von Vorschriften, die Verwaltung von Firewalls, Patching und die Reaktion auf Vorfälle. Ihr Hauptziel war es, einen Cyberangriff zu verhindern und die Sicherheit aufrechtzuerhalten. Doch dieses Modell wird der Komplexität moderner Bedrohungen nicht mehr…
-
NIS2-Umsetzung: Mehr digitale Resilienz für Europa
Experten begrüßen Kabinettsbeschluss Dänemark als mögliches Vorbild für nächste Schritte? Ende Juli hat die Bundesregierung den Kabinettsbeschluss zur Umsetzung der EU-NIS2-Richtlinie gefasst und damit den Weg für strengere IT-Sicherheitsanforderungen in Deutschland geebnet. Doch während Deutschland hierbei noch ganz am Anfang steht, hat unser Nachbarland Dänemark die Richtlinie bereits vollständig in nationales Recht umgesetzt… First seen…
-
NIS2-Umsetzung: Mehr digitale Resilienz für Europa
Experten begrüßen Kabinettsbeschluss Dänemark als mögliches Vorbild für nächste Schritte? Ende Juli hat die Bundesregierung den Kabinettsbeschluss zur Umsetzung der EU-NIS2-Richtlinie gefasst und damit den Weg für strengere IT-Sicherheitsanforderungen in Deutschland geebnet. Doch während Deutschland hierbei noch ganz am Anfang steht, hat unser Nachbarland Dänemark die Richtlinie bereits vollständig in nationales Recht umgesetzt… First seen…
-
NIS2-Umsetzung: Mehr digitale Resilienz für Europa
Experten begrüßen Kabinettsbeschluss Dänemark als mögliches Vorbild für nächste Schritte? Ende Juli hat die Bundesregierung den Kabinettsbeschluss zur Umsetzung der EU-NIS2-Richtlinie gefasst und damit den Weg für strengere IT-Sicherheitsanforderungen in Deutschland geebnet. Doch während Deutschland hierbei noch ganz am Anfang steht, hat unser Nachbarland Dänemark die Richtlinie bereits vollständig in nationales Recht umgesetzt… First seen…
-
Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE
Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE andrew.gertz@t“¦ Mon, 10/13/2025 – 14:53 Discover how Thales empowers enterprises with sovereign access through FIDO authentication in SAS PCE”, ensuring secure, phishing-resistant identity control for hybrid environments. Identity & Access Management Access Control Guido Gerrits – Field Channel Director, EMEA More About This Author…
-
CyberSmart Become a National Ambassador of the NCRCG
With Cyber Security Awareness Month firmly underway, the National Cyber Resilience Centre Group (NCRCG) has proudly welcomed CyberSmart on board as a National Ambassador. Funded and supported by the Home Office, policing and Ambassador business partners, NCRCG is bringing together all those who have a vital responsibility for combating cybercrime to help strengthen the cyber defences of…

