Perimeters Aren’t Dead – They’re Valuable

Perimeters Aren’t Dead – They’re Valuable

Since I first began building internet firewalls in the late 1980s, I have periodically encountered claims that “the perimeter is dead” or “firewalls don’t work.” These claims are rather obviously wrong: your firewall or perimeter are simply a way of separating things so you can organize them better. An internet firewall is an organizing principle [...]

Combating the Rising Threat of Malicious AI Uses: A Strategic Imperative

Combating the Rising Threat of Malicious AI Uses: A Strategic Imperative

A group of academics and researchers from leading universities and thinktanks – including Oxford, Yale, Cambridge and Open AI – recently published a chilling report titled, The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. The report raised alarm bells about the rising possibilities that rogue states, criminals, terrorists and other malefactors could soon exploit AI capabilities [...]

Five Questions on Board-Level Cybersecurity Considerations with Dottie Schindlinger

Five Questions on Board-Level Cybersecurity Considerations with Dottie Schindlinger

Editor’s note: Dottie Schindlinger, VP/Governance Technology Evangelist with Diligent and a panelist on the importance of tech-savvy leadership at ISACA’s CSX North America conference last October, recently told Forbes that cybercriminals target organizations perceived to be low-hanging fruit. Schindlinger visited with ISACA Now to discuss how organizations can avoid falling into that category and other key board-level cybersecurity considerations. [...]

When it Comes to Cyber Risk, Execute or Be Executed!

When it Comes to Cyber Risk, Execute or Be Executed!

Nestled in William Craig’s book Enemy at the Gates, which recounts World War II’s epic Battle of Stalingrad, is the story about a Soviet division that was plagued by failure in the face of the enemy. Desertions were rising, officers’ orders were not being followed, and the invading enemy was making gains. Faced with this calamitous [...]

CYBERSECURITY HIRING – AN ISSUE FOR ALL

CYBERSECURITY HIRING – AN ISSUE FOR ALL

As cyber threats proliferate, organizations looking to fill cybersecurity vacancies need to take concrete steps to reboot recruiting and hiring efforts. Qualified candidates for cybersecurity jobs are scarce and getting scarcer, creating a challenge for companies to properly defend themselves against threats. By 2022, an estimated 1.8 million cybersecurity jobs will go unfilled, according to [...]