Tag: technology
-
What past ERP mishaps can teach CISOs about security platformization
Tags: ai, automation, business, cio, ciso, cyber, cybersecurity, data, finance, metric, resilience, service, technology, tool, training5 tips for getting security platformization right: Current trending suggests that in many enterprises, security platform migration is inevitable in the short- or long-term. Given this, CISOs would be well served by carefully studying the mistakes made with ERP and plan accordingly with proven best practices. Based on my research, here are a few suggestions:Get executive…
-
What past ERP mishaps can teach CISOs about security platformization
Tags: ai, automation, business, cio, ciso, cyber, cybersecurity, data, finance, metric, resilience, service, technology, tool, training5 tips for getting security platformization right: Current trending suggests that in many enterprises, security platform migration is inevitable in the short- or long-term. Given this, CISOs would be well served by carefully studying the mistakes made with ERP and plan accordingly with proven best practices. Based on my research, here are a few suggestions:Get executive…
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…
-
Why can’t enterprises get a handle on the cloud misconfiguration problem?
Tags: access, ai, authentication, awareness, breach, business, cloud, communications, computing, control, cybersecurity, data, data-breach, encryption, governance, hacker, infrastructure, least-privilege, mfa, monitoring, network, risk, saas, service, technology, tool, training, usa, zero-trustStop. Reassess. Reconfigure: Last year, according to Ayan Roy, EY Americas cybersecurity competency leader, the highest number of breaches were caused by shared cloud repositories. “That’s where we saw the maximum amount of data exfiltration,” he says. “A lot was from shared cloud stores and SaaS applications.” That’s despite the fact that the clients have…
-
Why can’t enterprises get a handle on the cloud misconfiguration problem?
Tags: access, ai, authentication, awareness, breach, business, cloud, communications, computing, control, cybersecurity, data, data-breach, encryption, governance, hacker, infrastructure, least-privilege, mfa, monitoring, network, risk, saas, service, technology, tool, training, usa, zero-trustStop. Reassess. Reconfigure: Last year, according to Ayan Roy, EY Americas cybersecurity competency leader, the highest number of breaches were caused by shared cloud repositories. “That’s where we saw the maximum amount of data exfiltration,” he says. “A lot was from shared cloud stores and SaaS applications.” That’s despite the fact that the clients have…
-
OTsec India Organizers Share Tips on OT Security
OTsec India Steering Committee Discuss Cyberthreats, Compliance and Innovation. Featuring some of the most prominent voices in Indian operational technology cybersecurity, the steering committee for the inaugural OTsec India Summit shares insights on a range of topics including OT threats, regulatory imperatives and the latest innovations. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/otsec-india-organizers-share-tips-on-ot-security-a-29953
-
Sora 2 Makes Videos So Believable, Reality Checks Are Required
Threat actors will continue to abuse deepfake technology to conduct fraudulent activity, so organizations need to implement strong security protocols even if it adds to user friction. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/sora-2-makes-videos-so-believable-reality-checks-are-required
-
Rigged Poker Games
Tags: technologyThe Department of Justice has indicted thirty-one people over the high-tech rigging of high-stakes poker games. In a typical legitimate poker game, a dealer uses a shuffling machine to shuffle the cards randomly before dealing them to all the players in a particular order. As set forth in the indictment, the rigged games used altered…
-
Government considers physical ID cards
Physical ID cards may become available to those who don’t have access to technology when the government introduces its mandatory digital ID scheme First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634154/Government-considers-physical-ID-cards
-
Government considers physical ID cards
Physical ID cards may become available to those who don’t have access to technology when the government introduces its mandatory digital ID scheme First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634154/Government-considers-physical-ID-cards
-
IT Failure Starts With Silence, Not Systems
Former DoE CIO Ann Dunkin on the Lack of Communication, Engagement in IT Projects. IT projects fail for many reasons, but the most common isn’t technology – it’s a lack of communication, engagement and timely course correction. Even a well-funded IT project can stumble, says Ann Dunkin, former CIO of the U.S. Department of Energy.…
-
NDSS 2025 Safety Misalignment Against Large Language Models
SESSION Session 2A: LLM Security Authors, Creators & Presenters: Yichen Gong (Tsinghua University), Delong Ran (Tsinghua University), Xinlei He (Hong Kong University of Science and Technology (Guangzhou)), Tianshuo Cong (Tsinghua University), Anyu Wang (Tsinghua University), Xiaoyun Wang (Tsinghua University) PAPER Safety Misalignment Against Large Language Models The safety alignment of Large Language Models (LLMs) is…
-
Kasada Named Finalist in AFR BOSS Most Innovative Companies List
Honored by The Australian Financial Review’s 14th annual awards in the Technology category First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/kasada-named-finalist-in-afr-boss-most-innovative-companies-list/
-
Operational Technology Security Poses Inherent Risks for Manufacturers
Despite increased awareness, manufacturers continue to face an onslaught of attacks. First seen on darkreading.com Jump to article: www.darkreading.com/ics-ot-security/operational-technology-security-poses-inherent-risks-for-manufacturers
-
Kasada Named Finalist in AFR BOSS Most Innovative Companies List
Honored by The Australian Financial Review’s 14th annual awards in the Technology category First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/kasada-named-finalist-in-afr-boss-most-innovative-companies-list/
-
Risk ‘Comparable’ to SolarWinds Incident Lurks in Popular Software Update Tool
Some of the world’s biggest technology companies use a program liable to introduce malware into their software. The potential consequences are staggering, but there’s an easy fix. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/risk-solarwinds-popular-software-tool-update
-
Risk ‘Comparable’ to SolarWinds Incident Lurks in Popular Software Update Tool
Some of the world’s biggest technology companies use a program liable to introduce malware into their software. The potential consequences are staggering, but there’s an easy fix. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/risk-solarwinds-popular-software-tool-update
-
Risk ‘Comparable’ to SolarWinds Incident Lurks in Popular Software Update Tool
Some of the world’s biggest technology companies use a program liable to introduce malware into their software. The potential consequences are staggering, but there’s an easy fix. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/risk-solarwinds-popular-software-tool-update

