Ethical OS: How To Safeguard Users, Communities, Societies, And Companies From New Future Risks?

How can you predict the unintended consequences of the products you are building today?  How can you actively safeguard users, communities, societies, and your company from new future risks? As we think about the future of tech at Google, Yoav Schlesinger (Principal for the Tech and Society Solutions Lab at

Read More

It’s Not Enough To Mandate Security Protocols And Trainings, We Also Need To Exercise Empathy

5-second summary: Security is not just a technical issue; it’s an organizational and human problem, says Atlassian Chief Trust Officer Adrian Ludwig. To create resilient systems, developers and security teams need to realize their shared objectives. Personalize training so execs and team members understand how security risks impact their sections

Read More

U.K. Government’s PSTI Bill 2022 Bans Default Passwords: Does This Step Encourage Manufacturers To Consider Security?

The U.K. government has, and not before time, many would argue, moved to introduce legislation that will ban the use of dumb passwords in so-called smart devices. The Product Security and Telecommunications Infrastructure (PSTI) Bill has yet to become law; according to government sources that will happen as soon as

Read More

Government’s Role In Preventing Cyber-Attacks: A Effective Approach To Cyber Threats Is To Be More Focused On The Real Enemy

In the face of ever-more complex cyber threats, governments need to employ the full range of tools to deter adversaries. Responding To Exponentially Growing Cyber Threats In April 2021, based on a tip from the Federal Bureau of Investigation (FBI) and aided by public sanction data from US Department of

Read More

4 Types Of Approaches For Cybersecurity In Small And Midsize Businesses: Monitor And Target, Always Expect A Breach, Create A Culture Of Security & Scrutinize Your Supply Chain

Small and midsize businesses aren’t immune to cyber threats. They must research and prepare for attacks just as large enterprises would. Unfortunately, smaller companies typically have fewer resources and less talent available to help fortify against attacks. In March of last year, AI caught a sophisticated, highly targeted cyber-attack exploiting

Read More

Enabling Digital Trust: Cyber-Security Strategies For A Trusted – Digital Future

In the age of digital transformation, trust is an elusive asset, but one that’s never out of reach for organisations that have initiated the right actions, such as adopting a sustainable, forward-looking cyber-security strategy. “It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin

Read More

How Create A Diverse, Nextgen, Cybersecurity Workforce – People, Process & Technology | A Panel Discussion

From supporting a permanent remote workforce and accelerating digital transformation to preparing for an expanded threat landscape – it is more critical than ever that Security Leaders have the right structure and support in place to face the challenges of a post-COVID world. CISO’s have been integral to organizations surviving

Read More

Cloud Migration: A Cohesive Approach To Cloud Strategy – Implementing The Right Mix Of Security, Trust, And Business Agility

Introduction Increasingly, global organizations are migrating from legacy on-premise infrastructure to the cloud in order to achieve greater business agility and resilience with a modern IT approach. Yet too often, cloud migration and cybersecurity are considered separately, with different teams focused on different phases of what could be a shared

Read More

Safeguarding Our Privacy: Cryptography – A Sophisticated Scientific Art In A Connected World

Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss how, since the earliest days of communication, clever minds have devised methods for enciphering messages to shield them from prying eyes. Today, cryptography has moved beyond the realm of dilettantes and soldiers to become a sophisticated scientific art

Read More

Hackers Are Creating Significant Cybersecurity Challenges As Ransomware Went Wild

Ransomware is on a rampage targeting industry and organizations. It is also and creating significant cybersecurity challenges. Ransomware is a type of malware cyber-attack where key files are encrypted encryption by hackers that renders data inaccessible to the victim. It is a criminal extortion tool and after an attack has

Read More

The Spy In Your Phone: Because Every System Can Be Hacked – Detail Story About How Pegasus Works

In mid-2020, a mobile phone belonging to an Al Jazeera Arabic investigative team was hacked. Over the next few months, reporter Tamer Almisshal and the Canadian research group Citizen Lab investigated Pegasus, the sophisticated spyware used. Pegasus is manufactured by an Israeli technology company called the NSO Group and is

Read More

3 Ways To Improve Vulnerabilities And Prevent Digital Supply Chain Cyberattacks

Today, most software products rely on thousands of prewritten packages produced by vendors or drawn from open source libraries. The most commonly used of these third-party software supply chain components are highly prized targets for cybercriminals. If attackers were to infiltrate them, they could compromise thousands or even millions of

Read More