Security Culture

How Corporate Citizens Can Do Their Part in the Battle Against IoT Cyberattacks

How Corporate Citizens Can Do Their Part in the Battle Against IoT Cyberattacks

The business community has taken important strides toward understanding cybersecurity and using that knowledge to inform business strategies in recent years. Companies have also begun utilizing SSL/TLS encryption for their applications and websites in an effort to keep user data more secure. But unfortunately, many IoT manufacturers have prioritized being first to market over practical concerns...

Australia: Cisco Addressing Human Element of Security with Cyber Training Course

Australia: Cisco Addressing Human Element of Security with Cyber Training Course

Speaking with ZDNet, Anthony Stitt, GM of Security for Cisco in Australia and New Zealand, explained that Cisco's Introduction to Cybersecurity course focuses on how to protect personal data and privacy online and in social media, and explores why more jobs are requiring cybersecurity awareness and understanding. Edith Cowan University in Western Australia estimates there will be a shortfall of...

  • More at ZDNet
  • |
  • |
The Enemy Within: Spotting Insider Threats in Your Organization

The Enemy Within: Spotting Insider Threats in Your Organization

A crowd-based survey of 300,000 members of the LinkedIn Information Security Community, conducted by Haystax Technology, revealed growing concern about insider threats. Survey respondents were more concerned about accidental breaches or data leaks (71%) and negligent breaches (69%) than malicious breaches (61%). The rise of social engineering threats such as phishing has surely heightened concern...

The Inside Scoop on the Planet’s Leading Bug Bounty Program

The Inside Scoop on the Planet’s Leading Bug Bounty Program

Within the security researcher community, the Zero Day Initiative (ZDI) program is a well-known entity, representing the world’s largest vendor agnostic bug bounty program. ZDI is the group that buys 0-days so they have protections before the affected vendor releases a patch. At a high level, here’s how the program works. An independent researcher finds an otherwise unknown vulnerability...

Six Components of a Successful Security Awareness Program

Six Components of a Successful Security Awareness Program

1) Obtain C-level support: Highlight the fact that security awareness is required for compliance and that awareness efforts will inevitably save the company money. Creating materials specifically for executives, such as newsletters and short articles highlighting relevant news and tips can help garner the support; 2) To obtain support from other departments, you might have to incorporate the...

  • More at CSO
  • |
  • |
This Is how You Can Start a Career in Cyber Security

This Is how You Can Start a Career in Cyber Security

The map of cybersecurity domains designed by Henry Jiang shows that there are a number of things one should know to be an expert in cybersecurity. Continuously motivate yourself to learn as you grow in the field, and allow for more secure environments. You must have foundational knowledge along with an ability to adapt to each situation quickly. Cyber consultants, internal cyber, IT ops, risk and...

Cybersecurity Is in Demand, and These Washington Colleges Teach It

Cybersecurity Is in Demand, and These Washington Colleges Teach It

Earlier this year, President Donald Trump signed an executive order that outlines plans to improve data security for federal agencies and to better protect critical U.S. infrastructure. Cybersecurity is a field that’s in such high demand that many jobs go unfilled. Washington colleges and universities are ramping up their offerings in cybersecurity. Three community colleges — Whatcom,...

American Technology Council: The Biggest Names in Tech Head to the White House

American Technology Council: The Biggest Names in Tech Head to the White House

The White House is hosting a summit Monday (June 19) with top talent in technology. It's the first meeting of the American Technology Council, which was created by an executive order Trump signed last month. The group will talk about reforming the H-1B visa program, which Trump has criticized and says is abused by tech firms that use it to import cheap labor. Also on the council's agenda:...

  • More at CNN
  • |
  • |
Accenture, Microsoft Collaborate on Blockchain-Based Digital ID Network

Accenture, Microsoft Collaborate on Blockchain-Based Digital ID Network

Accenture Plc and Microsoft Corp are teaming up to build a digital ID network using blockchain technology, as part of a United Nations-supported project to provide legal identification to 1.1 billion people worldwide with no official documents. The companies unveiled a prototype of the network on Monday (June 19) at the UN headquarters in New York during the second summit of ID2020, a...

Are Artificial Intelligence and Machine Learning Enough to Plug the Skills Gap?

Are Artificial Intelligence and Machine Learning Enough to Plug the Skills Gap?

There aren’t enough humans available to do proper analysis, synthesis or anomaly detection in cybersecurity. The only way to fill the skills gap is to program computers to do the grunt work and leave humans to the decision-making, incident management and follow-up. The trouble with our situation is that we already have a cybersecurity skills emergency in many businesses and governments, and AI...

Digital Organizations Face a Massive Cybersecurity Skills Gap

Digital Organizations Face a Massive Cybersecurity Skills Gap

Digital insecurity will continue for the foreseeable future, with the biggest reason being that we don’t have enough well-trained, skilled cybersecurity professionals to go around. According to the Information Audit and Control Association (IACA), about a quarter of all cybersecurity positions are left unfilled for about six months. Reasons for this could be: The trickle of security students...

The Girl Scouts Organization are Adding a Cybersecurity Badge

The Girl Scouts Organization are Adding a Cybersecurity Badge

The organization announced this week the first of 18 new badges debuting in the fall of 2018. The Girl Scouts, founded in 1912, have long received badges when they mastered certain topics or skills. The cybersecurity badge will launch in partnership with security firm Palo Alto Networks. The new badges will become available to participants in kindergarten through 12th grade over the next two...

  • More at CNN
  • |
  • |
Nowadays Doctors Need to be Hackers, Too

Nowadays Doctors Need to be Hackers, Too

At the recent Cyber Med Summit, doctors put together a sort of hacker boot camp for medical professionals. The conference combined talks with gritty (and sometimes bloody) live-action simulations in which doctors were faced with a new kind of medical crisis: figuring out if patients -- or more specifically, the technology that keeps them alive -- has been hacked. During the conference, there were...

Universities And Colleges Are Getting Schooled On Cybersecurity

Universities And Colleges Are Getting Schooled On Cybersecurity

Institutions of higher learning harbor a wealth of information. And while knowledge should be transferred in the classroom, it should not be stolen. Colleges and universities are beginning to understand how vulnerable they are to hackers and identity thieves who want to steal confidential data. With the recent spike in cyberattacks against colleges, administrators are becoming increasingly...

Your Mouse Detects when You are Lying

Your Mouse Detects when You are Lying

The mouse attached to your computer and your hand may be telling us more about your identity than you suspected. Italian researchers recently published a study which declared a 95% accuracy in determining if a user was lying, based on the results of a machine learning algorithm which they created. DARPA is developing ‘a next generation biometric capability’ based on how users use a mouse and...

Officials and Experts Warn to Never Overlook Basics in Cybersecurity Strategies

Officials and Experts Warn to Never Overlook Basics in Cybersecurity Strategies

90% of successful cyberattacks originate from phishing. And though phishing is a technologically unsophisticated attack strategy, it remains viable and is enjoying resurgent popularity thanks to its reliance on human behavior, cybersecurity experts told attendees at the Missouri Digital Government Summit. IT staff is in dramatically short supply as a generation of staffers continues to retire,...

Read about the latest happenings in cyber security culture

This category provides expertly curated news on the security culture that includes the best cultural practices and the important cyber security cultural events that take place annually. The security culture is a polysemous term having multiple meanings. It means cyber security events that showcase the ideas, customs, and social behaviour of cyber security professionals and students. It also means the cyber security practices that are followed on a daily routine and form the cyber hygiene of the organisation. The category security culture aims to help organizations interweave their security practices with business operations to make robust organizational security framework. The cyber security events form an essential part of the security culture as they help different organizations and professionals to come together and share with the global community their research, innovations and experience. These events also provide platform for pouring of ideas that not only deal with the upcoming challenges but also seek to address the fundamental questions like What is Cyber Security, Importance of cyber security, What is data security, what is information security and what is internet security? Answer to these fundamental questions is essential given the dynamically changing nature of the cyberspace. Not only events but experts now tend to share their opinions on the blogs and Cyware makes it sure these expert blogs and opinions reach to you in real time so that your security culture that includes your practices related to internet security, cyber security, protection of security systems, information security, network security, and cyber security policy is shaped by existential realities.