Lawmakers press for $237 million to fully fund cybersecurity program

Three lawmakers are pressing House appropriators to fully fund a key cybersecurity program at the Department of Homeland Security in funding legislation for the next fiscal year. The program, called the Continuous Diagnostics and Mitigation (CDM) program …

Who Does What in Cybersecurity at the C-Level

As security evolve as a corporate priority, so do the roles and responsibilities of the executive team. These seven titles are already feeling the impact. What’s in a title? As the threat landscape grows more severe, job titles and lines of reporting …

Power grid cybersecurity tool uses machine learning and sensors to detect threats

In today’s always connected world, losing power is more than just an annoyance. “The truth is, we rely on electricity much more than we realize,” writes Sherry Hewins in her column What Could Happen in a Long-Term Power Outage? “Even if you live ‘off the …

CEO who journeyed from a Himalayan village to Wall Street sees his cybersecurity IPO close up 106%

Zscaler CEO and co-founder Jay Chaudhry sees shares of his firm’s IPO open 72 percent higher. “People are mobile. Applications are sitting in the cloud. So we had to build security in the cloud,” Chaudhry says. Jay Chaudhry grew up in a small Himalayan …

2018 Global Cyber Security Market Report 2013-2023 – Rising Incidence of Cyber Attacks & Usage of Mobile Devices is Driving the Market

The “Cyber Security Market by Component (Solution, Service), by Security Type, by Deployment Mode, by Organization Size, by Industry, by Geography – Global Market Size, Share, Development, Growth and Demand Forecast, 2013-2023” report has been added to …

Beyond the Hype: AI, ML, and Deep Learning in Cybersecurity (Part 3)

Insight for I&O leaders on deploying AIOps platforms to enhance performance monitoring today. Read the Guide. This is the final piece of my three-part blog on the topic human intelligence vs. AI, and how AI is being used successfully to address various …

Top 5 reasons to come to Nashville for CUNA Cybersecurity Conference

The strategies that cybercriminals use to attack your credit union are always changing, and sometimes the weaknesses they exploit won’t be noticed until it’s already too late. At CUNA Cybersecurity Conference in collaboration with NASCUS, June 4-5 in …

How is Machine Learning Revolutionizing Cyber Security?

What role does machine learning play when it comes to cybersecurity and networking security? When people first adopted machine learning as a new kind of technology, it revolutionized the realm of cybersecurity, and it has continued to do so over the last …

CTO Assist With Island’s Cybersecurity Strategy

Minister of National Security Wayne Caines recently met with members of the Commonwealth Telecommunications Organisation [CTO], who were on island to assist with Bermuda’s cybersecurity strategy. The CTO is an intergovernmental organisation whose core …

CTO assists with cybersecurity strategy

Key needs, gaps and opportunities for Bermuda’s cybersecurity position have been identified in close consultation with members of the Commonwealth Telecommunications Organisation. Representatives of the CTO were on the island to assist with Bermuda’s …