The real impact of the cybersecurity poverty line on small organizations Winnefeld, advisor to Acalvio Technologies, compares the strategies of traditional and cyber warfare, discusses the difficulty of determining the attack’s nature, addresses ethical dilemmas, and promotes collaboration and cooperation with allies, partners, and, in some cases, even adversaries. In this Help Net Security interview, Admiral James A.
The evolution of deception tactics from traditional to cyber warfare In this Help Net Security interview, Phil Venables, CISO at Google Cloud, discusses the results of a recent Google report on board collaboration with the C-suite - particularly the CIO, CTO, and CISO to stay current with trends and prioritize security, rather than treating it as an afterthought. The collaborative power of CISOs, CTOs and CIOs for a secure future State-sponsored North Korean hackers have significantly intensified their focus on the IT sector in recent years, by infiltrating firms developing software and companies lookind for IT workers. North Korean hackers are targeting software developers and impersonating IT workers Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: