Modern day cybersecurity: Enabled by automation, managed by human skills

This article emphasizes the evolving landscape of cybersecurity, where automation via AI must be managed by skilled human professionals for optimal outcomes. As artificial intelligence and generative AI become more integrated into security tools, the demand for cybersecurity experts to interpret and oversee these complex systems grows stronger. The insights from various industry leaders underscore […]

Read More →

USF Creates New College of AI and Cybersecurity

Summary The University of South Florida (USF) is set to launch the Bellini College of Artificial Intelligence, Cybersecurity, and Computing this fall, backed by the largest donation in the university’s history—a whopping $40 million. The college aims to address the pressing cybersecurity workforce shortage in light of escalating cyber threats across the nation. Tech entrepreneur […]

Read More →

Pentagon seeks input on plan to streamline software authorizations

Summary The Pentagon is taking strides to simplify the software authorisation process within the Department of Defence (DOD) through a new initiative called SWIFT – Software Fast-Track. Announced by acting CIO Katie Arrington, this programme aims to overhaul the current authority-to-operate process, making it quicker and more efficient while maintaining robust security standards. A recent […]

Read More →

Portland firm suspends messaging app used by Trump official after apparent hack

Summary Portland-based tech company Smarsh has announced the suspension of its messaging app, TeleMessage, after it suffered a security breach. The app, used by former National Security Adviser Mike Waltz for communication, faced scrutiny following the apparent hack, which raised concerns about data integrity and security in governmental communications. Smarsh is currently working with cybersecurity […]

Read More →

Risk rebalancing: Five important geopolitical-risk questions for CIOs

Summary In a world increasingly influenced by geopolitical events, CIOs must rethink their approach to technology risk. This article explores the impact of geopolitical complexities on global IT operations and outlines five key questions CIOs should ask to navigate these risks effectively. Key areas of focus include asset vulnerability, potential disruptions, intervention strategies, mitigation steps, […]

Read More →

Signal Clone Used by Mike Waltz Pauses Service After Reports It Got Hacked

The messaging app TeleMessage, which was found on the phone of former US national security adviser Mike Waltz, has halted all operations to investigate allegations of a data breach involving its services. The parent company, Smarsh, has confirmed ongoing investigations into the incident, with a cybersecurity firm now involved. Source: Wired Key Points TeleMessage has […]

Read More →

Neue Entwicklungen im EU-Digitalrecht

Summary The European Commission has set forth new digital policy priorities aimed at advancing the European digital single market. Key focus areas include cybersecurity, technological sovereignty, and refining market and consumer regulations within the digital space. Unlike previous legislation periods that saw the introduction of new acts like the DSA, DMA, and AI Regulation, the […]

Read More →

Warning: Cyber criminals are coming for your client’s retirement information

Summary The article discusses the rising threat of cybercriminals to employee retirement information, highlighting recent updates from the Employee Benefits Security Administration (EBSA) of the U.S. Department of Labor. It outlines 12 key cybersecurity recommendations for plan sponsors and fiduciaries to enhance protection against cyber threats. These guidelines aim to secure sensitive employee data and […]

Read More →