Initiative Aims to Encourage Diverse Talent into Cyber

Read Time:2 Second

National Cybersecurity Alliance launches HBCU career program

Read More

Women in cybersecurity form non-profit organization The Forte Group

Read Time:46 Second

A group of over 90 women working in cybersecurity roles have formed The Forte Group, a non-profit organization for the education and advocacy of women in the cybersecurity industry.

The voluntary group is headquartered in California but is offering a global membership. The group was formed informally earlier during the pandemic. Members would meet once a month to share their experiences, and also use their collective voice as a means for change. 

“Over time, we have seen the collective power of this group. Officially forming a non-profit allows us to raise and deploy funds to further our mission. We’ve heard from companies and organizations who want to contribute to the work we are doing, and we felt like it was a missed opportunity without the structure in place to partner with these folks,” said Zenobia Godschalk, vice chair of the Forte Group.

To read this article in full, please click here

Read More

Resolving conflicts between security best practices and compliance mandates

Read Time:43 Second

So, you read a great tip on the internet and think it would improve your security posture. Before you bring that tip to management, it’s wise to determine if it’s allowed by your security compliance requirements or can become an acceptable exception to your compliance templates.

Many of you work for firms that have multiple compliance mandates. The larger and more international your corporation, the more alphabet soup of technology compliance regulations need to be followed: the European Union’s General Data Protection Regulation (GDPR), the American Health Insurance Portability and Accountability Act (HIPAA), the Payment Card Industry Data Security Standard (PCI DSS), the guidance by the National Institute of Standards and Technology (NIST), the Federal Information Security Management Act (FISMA), and the Center for Internet Security (CIS) controls to name a few.

To read this article in full, please click here

Read More

Stuxnet explained: The first known cyberweapon

Read Time:27 Second

What is Stuxnet?

Stuxnet is a powerful computer worm designed by U.S. and Israeli intelligence that to disable a key part of the Iranian nuclear program. Targeted at an air-gapped facility, it unexpectedly spread to outside computer systems, raising a number of questions about its design and purpose.

Stuxnet exploited multiple previously unknown Windows That description should probably make it clear that Stuxnet was a part of a high-level sabotage operation waged by nation-states against their adversaries.

To read this article in full, please click here

Read More