GDPR Is Here: Resources for Your Compliance Journey

Today is the day. After all the build-up, the GDPR deadline is officially here. From the inevitable next breach, we will more fully understand how well organizations prepared and the implications of this far-reaching regulation. The regulation is designed to better address the protection of personal data, so much of the buzz around GDPR has…

Senator Asks DoD to Secure Its Websites

Senator Ron Wyden (D-Ore.) on Tuesday asked the chief information officer at the U.S. Department of Defense (DoD) to take immediate action to ensure that the organization’s websites use HTTPS. The senator noted that some of the DoD’s websites, such as the ones belonging to the NSA, the Army, and the Air Force, do use…

Google to Delete ‘Secure’ Label from HTTPS Sites

Google plans to remove the “secure” label from HTTPS websites starting in September 2018, a move intended to acknowledge HTTPS as the standard for browser security. Users should expect all the sites they visit to be secured with HTTPS, the company reported last week. Earlier this year, Google announced plans to mark all HTTP sites as “not…

25% of companies affected by cloud cryptojacking

Cryptojacking has unquestionably gone mainstream. Despite heavy media and industry attention, organizations are struggling to meet compliance requirements in public cloud environments, according to RedLock. On the flip side, there’s evidence that companies are becoming more aware of cloud account compromises and implementing best practices to prevent attacks, but there’s still no shortage of new attack…

Can AI help bridge the IT security skills gap?

Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to artificial intelligence systems.

EU Data Protection May Trigger Global Ripple Effect

The EU’s new data protection rules that enter into force later this month are having an impact around the world as firms, including in the United States and China, move to comply. While all firms globally are required to comply with the provisions of the General Data Protection Regulation (GDPR) when it comes to the data of…

Social media: The zero-trust game

Our value today is measured in numbers. Followers, connections, likes, tweets, and impressions now count toward not only the value of our opinions but also quantify our sphere of influence. These metrics, however, are easily manipulated to such an extent that even elections have allegedly been at the mercy of the social media numbers game….

The dangers of vacation planning

So, you’ve been working all year long and finally decided to go on a nice vacation, taking a couple of weeks away from home, office, and everything else? That’s great! Of course, you don’t want anything at all to go wrong with your hard-earned break. To avoid disappointments — or worse — down the road,…

Millennials, Women May Bridge Cyber Talent Gap

Younger generations, particularly women, could be the answer to a cybersecurity skill shortage expected to reach 1.8 million unfilled roles by 2020. A survey of millennials and post-millennials in the US gives some optimism about the cybersecurity talent gap, which seems doomed to worsen due to perception challenges about industry careers, poor access to early…