• I finally found a smartwatch with a timeless analog look - and the features I need
    www.zdnet.com
    If you're not a fan of the most smartwatches' modern design, Withings' Scanwatch Nova combines an analog design with extensive health and wellness tracking.
    0 التعليقات ·0 المشاركات ·35 مشاهدة
  • Are Conspiracy Theories Fueled By Spite?
    www.forbes.com
    GettygettyConspiracy theories are driven by a surprising factor, according to British psychologists - spitefulness.There are already three established motivations for conspiracy thinking: epistemic motives - a need to understand the worlda need for security, known as existential motives, and a need for social significance, or social motives.And, over three studies involving 1000 participants, psychologists from the University of Staffordshire and the University of Birmingham looked at how spitefulness interacted with all three.And, they found, not only were higher levels of spite associated with a stronger belief in conspiracy theories, spite that actually caused people with the three predictors to believe them."We are not suggesting that people consciously choose to be spiteful when believing and spreading conspiracy theories," said co-author Megan Birney from the University of Birmingham."Instead, our findings suggest that feelings of disadvantage in those three areas can provoke a common psychological spitefulresponse, one that makes individuals more receptive to believing conspiracy theories."The research has implications for the best strategies for countering conspiracy theories. The authors found, for example, that the strongest relationship was between belief, spite and uncertainty about the world.And, they suggest, this could be dealt with via more effective science communication and media literacy around complex topics aimed at countering misinformation.The researchers also suggest that efforts to combat belief in conspiracy theories shouldn't simply focus on countering misinformation but also address the social and political conditions that foster feelings of disenfranchisement, precariousness and competition, such as such as financial insecurity and inequality.For those who feel disadvantaged, they said, accepting and propagating conspiracy theories can undermine the status of professionals and institutions, while at the same time bolstering the conspiracy theorists own ego, identity, and autonomy."Spiteful psychological motives tend to emerge when people feel at a competitive disadvantage, often when we feel uncertain, threatened or undervalued," explained lead researcher Dr David Gordon from University of Staffordshire."Spite is the desire to level the playing field by trying to knock someone else down because it feels like there is no other choice. Conspiracy theories can serve as a way for individuals to satisfy this desire through rejecting expert opinion and scientific consensus."Meanwhile, the authors suggest, their results have implications for how responses to conspiracy theories should be formulated. It's worth bearing in mind, they said, that those sharing them may not believe completely what they claim - instead, they may simply be trying to cause harm and distress.
    0 التعليقات ·0 المشاركات ·34 مشاهدة
  • CSRD In The U.S.: What Companies Need To Know And How To Prepare
    www.forbes.com
    This ambitious directive presents American companies with an opportunity to integrate sustainability into their core operations.
    0 التعليقات ·0 المشاركات ·36 مشاهدة
  • TikTok, Reddit & Imgur Under Investigation over Handling of Childrens Data
    techreport.com
    Key TakeawaysThe UKs data watchdog has launched an investigation into three social media platformsTikTok, Reddit, and Imgurover their handling of the personal information of children.TikTok will also be judged on its data protection policies, whereas Imgur and Reddit will be scrutinized based on their age verification process for minors.TikTok, Reddit, and Imgur are under fire from the UKs data watchdog over how they handle the personal data of children those aged between 13 and 17.An investigation has been launched by the Information Commissioners Office (ICO), which is looking into how these platforms run their algorithms. For those unaware, these algorithms ultimately decide what content gets recommended to users.Some critics are worried that these algorithms can expose young users to harmful content and trap them in a vicious loop, where they get habituated (or even worse, addicted) to such types of content. These concerns are justified, too, as weve recently seen Instagram coughing up sensitive content out of nowhere.This isnt the first time authorities have raised questions on TikTok, either. Back in January, UK technology minister Peter Kyle said, I am genuinely concerned about the ownership model of TikTok.There have also been concerns over TikToks data protection given its track record. Just last year, the ICO fined it 12.7 million for failing to protect the privacy of children. According to the complaint, the company used the data of more than 1.4 million children without the permission of their parents to intentionally profile and target them with inappropriate content.The authorities are worried that a repeat of the 2023 events might be happening again.Reddit and Imgurs Age VerificationIn addition to the investigation over the usage of childrens data, Imgur and Reddit will also be questioned on their age verification process.While both platforms explicitly state that no one under the age of 13 is allowed on their platforms, its really not that hard to bypass these rules.And with the younger generation getting more tech-savvy, companies need to keep up.The authorities want to check exactly what these companies are doing to ensure underage users cant sneak in.What Do the Companies Have to Say?TikTok responded to the probe by saying that theyre deeply committed to creating a safe and positive experience for all their young users. The company is already taking a lot of measures, including best-in-class security and monitoring tools, to protect minors from inappropriate content.The other two platforms, Reddit and Imgur, are yet to respond.Ever since the UK introduced the Childrens Code, tech companies have been under greater pressure to step up their security game. This new set of laws holds online platforms to a higher standard where theyre expected to apply the highest privacy setting by default for all users under 18.Its also on these companies to protect young users from all sorts of online harm, such as exploitation, cyberbullying, and online sexual abuse.While most companies have been trying to adapt to the new changes, there have been instances of slip-ups, such as in the case of TikTok in 2023. However, the good thing is that slip-ups will no longer be ignored. The ICO has decided to fine every offense accordingly to reflect the severity of the issue.Add Techreport to Your Google News Feed Get the latest updates, trends, and insights delivered straight to your fingertips. Subscribe now! Subscribe now Alpa is a senior editor with a wealth of experience in alternative finance, fintech, cryptocurrency, app security software, and the medical industry. She's currently an in-house managing editor with the Techreport team.Alpa is passionate about breaking down complex topics and sharing informative content that provides value. View all articles by Alpa Somaiya Our editorial processThe Tech Reporteditorial policyis centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written byreal authors.
    0 التعليقات ·0 المشاركات ·34 مشاهدة
  • A private company has successfully landed landed on the Moon for the first time
    www.techspot.com
    What just happened? Multiple governments and companies have struggled to land spacecraft safely on the Moon in recent years. As NASA's goal of sending humans to the lunar surface for the first time in over half a century faces repeated delays, a Texas-based company has become the first private entity to complete a fully successful landing. Firefly Aerospace's Blue Ghost Mission 1 lander successfully touched down on the lunar surface at 3:34 a.m. ET (02:34 CST) on Sunday, becoming the first non-governmental object to land on the Moon without issue. The feat marks an early step in NASA's efforts to establish a lunar economy.The two-meter lander lifted off aboard a SpaceX Falcon 9 rocket from the Kennedy Space Center in Cape Canaveral, Florida, on January 15, embarking on a leisurely 45-day mission to the Moon. In the hours following touchdown, the Blue Ghost transmitted impressive images of its thrusters, antenna, and shadow on the lunar surface, visually confirming a fully successful mission. It recently sent a photo of a sunrise (below).Two other private companies previously attempted Moon landings, one was a failure and the other was a partial success. In 2023, Japanese firm ispace lost contact with its Hakuto lander in the final minutes of its descent, indicating that it likely crashed. The Odysseus lander from Intuitive Machines touched down the following year, becoming the first American craft to reach the Moon since 1972, but it fell over after a rough landing, shortening the mission.Governments have also recently encountered problems. Russia's LUNA-25 mission crashed in 2023, and Japan's SLIM craft landed upside down last year. Although the partially successful mission made Japan the fifth country to send an object to the Moon intact, the lander failed to receive sufficient power to complete its mission.The United States' Artemis I mission successfully orbited the moon in 2023, but the next phase Artemis II's manned flyby has suffered multiple delays. If it succeeds next year, the US might send the first astronauts to the lunar surface in over 50 years as soon as 2027.Multiple governments and companies are planning infrastructure projects on the Moon, including data centers, rail lines, concrete buildings, nuclear reactors, and more. NASA science instruments onboard the Blue Ghost will conduct experiments to begin laying the groundwork for future commercial missions.For those wondering why reaching the Moon seems harder than it was in the 1960s and 70s, money and safety are the primary reasons. A lengthy 2024 report from Scientific American explains that the Artemis missions are trying to repeat what Apollo accomplished with fewer missions, more safely, and at a fraction of the budget. // Related Stories
    0 التعليقات ·0 المشاركات ·38 مشاهدة
  • Nvidia and Broadcom are testing Intel's 18A capabilities, but future deals remain uncertain
    www.techspot.com
    Something to look forward to: Intel's push into contract manufacturing comes at a critical time. The success of its foundry business was central to former CEO Pat Gelsinger's revival plan. However, Gelsinger was fired in December, and the company has since mothballed its forthcoming artificial intelligence chip, pushing back hopes for that product until at least 2027. Intel is making strides in its bid to become a true player in the contract chip manufacturing business. Sources familiar with the matter told Reuters that Nvidia and Broadcom are conducting manufacturing tests with Intel, signaling early confidence in the company's advanced production techniques.These previously unreported tests focus on Intel's 18A process. The tests, which could last for months, are not being conducted on complete chip designs. Instead, they aim to evaluate the behavior and capabilities of the process. Chip designers often purchase wafers to test specific components before committing to high-volume production of a full design.However, these tests do not guarantee future business for Intel. Last year, a batch of Broadcom tests reportedly disappointed its executives and engineers, although the company stated it was continuing to review Intel's foundry.The struggling chipmaker has attracted attention from the U.S. government, which sees Intel as crucial to restoring American manufacturing prowess and competing with China.Earlier this year, administration officials reportedly met with TSMC CEO in New York to discuss the possibility of TSMC taking a majority stake in a joint venture with Intel's factory unit. However, this week, TSMC announced a new $100 billion investment in U.S. chip production, adding to its existing $65 billion commitment in Arizona. The move aligns with the U.S. national security push to boost domestic chip manufacturing it's a clear sign that the Taiwanese chipmaker is ready to spend money in the U.S., but not necessarily for Intel's assets. // Related StoriesThe funding will support three TSMC fabrication plants, two advanced packaging facilities, and a research and development center in the United States.Synopsys CEO Sassine Ghazi says Intel's 18A process currently performs at a level between TSMC's most advanced process and its predecessor. "Right now, there are a lot of customers waiting I'm talking foundry customers to see the state of Intel. Will I commit? Will I not?" Ghazi told Reuters.Intel confirmed last week that the 18A process node is "ready" for third-party clients, with tape-out design finalizations set to begin in the first half of 2025. The node is expected to introduce advanced semiconductor features ahead of products featuring TSMC's N2 process, which is set to debut in 2026.18A promises a 30 percent increase in chip density and a 15 percent improvement in performance per watt compared to Intel 3. The company plans to use the process for its upcoming Panther Lake laptop processors and Clearwater Forest server CPUs, both of which are expected to launch before the end of the year.Intel has also announced deals with Microsoft and Amazon to produce chips on the 18A process, but details remain scarce. The company is expected to generate $16.4 billion in revenue from its foundry business this year, but almost all of that revenue is expected to come from Intel itself. Last year, revenue for the foundry segment declined by 60 percent, and the company has stated it will not break even until at least 2027.
    0 التعليقات ·0 المشاركات ·34 مشاهدة
  • PSA: If you bought an Nvidia RTX 50, check it for problems
    www.digitaltrends.com
    Table of ContentsTable of ContentsMake sure youre using the right cablesInstall the latest BIOS and drivers that workCheck for missing ROPsInstall and older secondary GPU for older game supportTo say Nvidias RTX 50 graphics card launch has gone poorly would be an incredible understatement. There are almost no cards in stock, despite Nvidia shutting down last-generation production at the end of last year to prepare for it, but the cards that are our there are failing in all sorts of ways. From driver and BIOS issues, to melting power cables, and even missing hardware on the GPU die itself.If you were lucky enough to get hold of one of these cards, you really need to make sure you got what you paid for.Recommended VideosPCMThere were a lot of problems with Nvidias RTX 4090 when it first launched, but Nvidia fixed that with a new power connector. Or so we thought. Thats why when RTX 5090s and some 5080s started having problems with melted or damaged power connectors, and even damaged power supplies and graphics cards, everyone was so surprised.Get your weekly teardown of the tech behind PC gaming But power problems are still here and here to stay, it seems. Third-party power cables often appear to be at fault, but we cant discount user error or poor airflow around these hot and demanding cables.Even if you havent encountered any issues with your GPUs cabling yet, make sure that youre using first-party cables only, and that you dont have any kinks or restricted airflow around your GPU and its power connectors.Many of the latest RTX 50 graphics cards have been facing strange black screen issues since launch. This can happen at random times and making some of these new cards all but unusable. Fortunately, Nvidia has a fix for it and has released updated drivers and BIOS updates for a range of RTX 50 cards that should fix the problem.Unfortunately, for some this issue still isnt fixed. So, while the best general advice we can give if youre facing black screen issues is to update your card and its drivers to the latest versions, read up what your fellow gamers are saying. If theres an older driver or BIOS that works better for now, roll back to that instead to get your card working. When Nvidia has ironed out the kinks, then you can download the latest releases for a proper fix.One of the strangest issues with the RTX 50 generation, is that more than 0.5% of all cards sold have been found to have missing hardware, specifically ROPs. These Render output units, accelerate specific functions of the GPU and are vital to its performance. Cards are missing 8 ROPs each, which in some cases can equate to close t0 10% of the total. Some third-parties have found performance can be impacted by between one percent and 11 percent, so the swing can be huge.You can check if your card is missing ROPs using these steps. Hopefully you wont be affected, but if you are, youll need to get in touch with your graphics cards manufacturer, be it Nvidia or a board partner, and request either a refund or return and replace.Its probably smarter at this stage to request a refund and buy something else at retail the turnaround time will almost certainly be faster, even if you have to wait for Nvidias cards to come back in stock. AMDs new GPUs are just around the corner, afterall.If you do request a replacement, though, be sure to test it thoroughly when you receive it to make sure its not also negatively effected.Are you trying to play older games on your RTX 50 and finding the performance terrible? It could be because Nvidia deprecated 32-bit PhysX support with its new-generation. You can get around this by installing a secondary PhysX-supporting GPU, though. Its not a cheap fix, but if you really want to play those old classics on your new card, doing so with another GPU to help is the best way forward for now.Editors Recommendations
    0 التعليقات ·0 المشاركات ·35 مشاهدة
  • Problems with Starship force SpaceX to call off test flight at the last minute
    www.digitaltrends.com
    SpaceX was set to perform another test of the worlds most powerful rocket last night, but the launch was scrubbed in the final minute before takeoff. Now the eighth test flight of the Starship will have to wait for at least a day as engineers check on problems with the rocket.Starship was scheduled to blast off from SpaceXs Starbase facility in Texas at 6:30 p.m. ET (3:30 p.m. PT) on Monday, March 3, and the rocket was fueled and on the pad ready for takeoff. But the countdown clock was paused at T-40 seconds, and SpaceX said there were issues that could involve both the first stage (aka the Super Heavy booster) and the upper stage (aka the Ship).Recommended VideosThe company has not given details on what the issue was, but it did write in an update, Standing down from todays flight test attempt. The Starship team is determining the next best available opportunity to fly.Please enable Javascript to view this contentSpaceX CEO Elon Musk also wrote on X that there were [t]oo many question marks about this flight and that ground control saw 20 bar low on ground spin start pressure. He wrote that they would destack the rocket (that is, remove the upper stage from the lower stage), inspect both stages, then try the test flight again in a day or two.The launch had already been delayed from its originally scheduled date of Friday, February 28. The previous Starship test, flight number seven, saw the rocket explode in the air with pieces of debris crashing to Earth and some flights having to be diverted. This version of the Starship has extensive upgrades from previous versions which have completed the test flights successfully including catching of the Super Heavy booster. But this new configuration has yet to complete its planned mission of flying a suborbital trajectory and deploying test payloads, as well as the tricky re-entry procedure.SpaceX has shared details of the issue which caused the explosion of the seventh test flight, saying that vibrating rhythmic oscillations caused propellant leaks, with propellant building up in the back of the spacecraft in an area called the attic which then caught fire. To address this issue, the version of Starship to be used for the eighth test has new propellant feed lines which should withstand oscillations and better venting of the attic to prevent buildup of propellant there.A new time and date for the eighth test flight has not yet been announced.Editors Recommendations
    0 التعليقات ·0 المشاركات ·36 مشاهدة
  • Get Control Over Unstructured Data
    www.informationweek.com
    Worldwide, data is generated at a daily rate of 402.7 million terabytes, and roughly 80% coming into enterprises is unstructured. By unstructured, we mean data that is not organized into recognizable and parsable record lengths that have established keys into the data.Instead, unstructured data could come in the form of monolithic video or audio recordings, photos, CAD drawings, e-mails, hard-copy documents, X-rays and MRIs, social media posts, or even the jibberish from telecommunications and network device handshakes and exchanges.Enterprises struggle to get on top of this data, or to even use it at all. This prompted Splunk to report that, More than 1,300 business and IT leaders in seven leading economies have spoken: They struggle to find all their data -- and report that more than half of it is dark -- untapped and, often, completely unknown. And, while they know AI will be transformative, theyre not sure when and how.These points are well taken, because if you want to excel in AI, you need the ability for the AI to mine all of the data that is available, not just 20% of it. To do this, enterprises must get a handle on their unstructured data.How do you do this? By sorting through the data, deciding which parts of it are good, and then organizing the good data so it can be used in systemic processes like AI.Related:The catch for IT is defining an approach that can do these steps. How do you sort, classify and organize data that is coming into the company at such fierce velocities?Step 1: Analyze your unstructured data. Where is your unstructured data coming from, and in what form? How much storage is the data consuming, and what is the cost? Where is the data stored, and who is using it? Who owns the data? How old is the data?All are top-level questions that should be answered for every type of unstructured data that you have in your company.Step 2: Identify data silos. Some of the unstructured data is likely to be owned by specific user departments and may be on separate systems. If the data is exclusively contained within a specific user department, it is considered a data silo that cannot be leveraged by other departments company because those departments dont have access to the data. The data in these silos may not be consumed for what could be a variety of untapped business processes. Siloed data also creates risk when different departments use disparate data and come to discordant business decisions.The primary goal in step 2 is identifying data silos, along with identifying the types of unstructured data that reside in those silos.Related:Step 3: Revisit data retention. How much of this unstructured data doesn't add value, including network handshake noise, or data that is so old or obsolete that no one has used it for years?With IT offering guidance, central data storage and systems in the data center or in user departments and the cloud should be reviewed to determine which data can be jettisoned because it isnt useful. Internal and cloud data retention policies should be reviewed by IT and end users so there is an agreed-to understanding on which types of unstructured data are to be retained and for how long.Some of this data may be non-electronic, such as a hardcopy company products catalogue that has been stored in a backroom closet since the 1980s.Finally, financial insight should be incorporated into the data housekeeping effort. How much facility and disk space are you freeing up by getting rid of useless data, and what is the annual savings?Step 4: Classify and organize data. Once you have eliminated unnecessary unstructured data, its time to classify and organize the data that remains. This task can be labor intensive because so much data classification must be done by hand, with knowledgeable users applying data tags to data objects. For example, that may require tagging all unstructured data artifacts with a product label because they consist of CAD, CAM, photo and video documents of company products.Related:Data tags are the only way to define and navigate through unstructured data objects so people can find what theyre looking for. Unfortunately, data tagging is time-consuming and frustrating when the number of unstructured data objects is huge. These data tags should also be standardized and agreed to across the organization so data retrieval is simplified.Although most organizations cant get around hand tagging data, we are beginning to see automated data tagging software come to market that can do the tagging automatically if it is given a set of business rules. There will also be future support from AI-powered tools that can learn how to evaluate and classify unstructured data objects.Step 5: Enrich data. Let's say that Company ABC wants a bid for a power plant. Much of the data for preparing the bid comes in forms such as schematics, PDF files, hardcopy and email correspondence. This unstructured data, along with traditional structured data, needs to be cleaned, formatted and normalized so it can interact with other types of data in a single data repository that supports decision making during the bid process.There is also a need to import outside data from the cloud and third parties on elements like logistics and weather conditions in the project locale, as well as local regulatory and zoning requirements.Tools like ETL (extract-transform-load) can automate much of the data cleaning and formatting processes, but it still requires IT to write the business rules for data transformation. Plus, the unstructured data being funneled into the data repository must be pre-classified and tagged by end users.The goal of step 5 is to enrich data so that it can interact with all the other types of data to produce a complete picture of a customer, a product, a situation, etc. This helps business decision makers as they think through strategy, tactics, schedules, pricing, and so on.Closing RemarksRealistically, few companies will succeed at harnessing 100% of the unstructured data that streams into them every day, but they can begin to get a handle on unstructured data by identifying where the data is coming from, where it will end up being hosted, what it is, and when it can be discarded.A follow-up and highly do-able step is silo busting, and the beginning of a corporate-wide data repository that contains both structured and unstructured data.The ultimate goal of developing highly enriched data that delivers optimal business value might have to wait until automated data classification and AI technologies mature, but theres a lot that IT can do right now to be ready for that time.
    0 التعليقات ·0 المشاركات ·34 مشاهدة
  • A Shield of Defensibility Protecting CISOs and Their Companies
    www.informationweek.com
    In todays rapidly evolving regulatory landscape, CISOs are facing unprecedented challenges and scrutiny. From the SECs materiality rules to high-profile legal cases, such as SolarWinds and Clorox, CISOs increasingly face personal and professional risks related to perceived cybersecurity failures. Recently, Proofpoint surveyed 1,600 CISOs worldwide to get a pulse on how CISOs are navigating these challenges, finding that 66% are concerned about personal, financial, and legal liability in their role. Additionally, 72% indicated that they wouldnt join an organization that didnt offer them directors and officersinsurance or similar coverage to protect them against financial liability in the event of a successful cyberattack. Given these reasonable concerns, how can CISOs build a shield of defensibility to protect themselves and their organizations?Creating a System of RecordThe first critical step is for CISOs to build and maintain a comprehensive management system of record that meticulously documents key cybersecurity decisions, actions, and assessments.Begin by defining the scope and objectives of the management system, including the types of cybersecurity decisions, actions, and assessments to document, which regulatory requirements and industry standards the organization must adhere to, and the key stakeholders and their roles in the system.Related:CISOs may choose to store this system of record in a governance, risk, and compliance tool, a document management system, or a custom solution tailored to the organizations specific needs. In any case, the solution must document specific actions, decisions, and assessments, and include version control mechanisms to track changes over time, creating an audit trail that shows what changed, when, and why.Fulfilling the Duty of CareCISOs can demonstrate that they have fulfilled their duty of care by implementing a cybersecurity program that aligns with industry frameworks, such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) or the International Organization for Standardization (ISO) 27001 to establish a structured approach for identifying and addressing risks. CISOs must also conduct regular risk assessments and vulnerability scans to identify and mitigate security gaps and work to ensure their teams develop, document, and maintain robust security policies, procedures, and controls. These policies, procedures, and controls may be integrated into ongoing cybersecurity awareness training to ensure a broader understanding of business risks, including those related to human errors.Related:In addition to continuously assessing the effectiveness of controls and overall security posture, the CISO and their security team must stay up to date with relevant compliance requirements and meet or exceed them. The recent SEC requirements requiring disclosure of material cybersecurity incidents within four days of determining that the cybersecurity incident is material further highlight the need for CISOs to implement incident response and business continuity plans. As threat actors swiftly shift tactics and techniques, security teams must regularly test and update these plans in order to be able to report quickly and accurately on the materiality of such incidents.Communicating Cyber DecisionsCyber incidents are increasingly disrupting business operations, driving CISOs and other cybersecurity leaders to communicate cyber risks, mitigation strategies, and resource needs with other executives and the board of directors. Instead of focusing on technical details of breach prevention and different threat models, CISOs must now communicate cyber risk in terms of business objectives and impact. Provide clear, regular updates to establish ongoing communication about the cybersecurity program and how it enables the organization as a whole to meet its business goals. Use real-world scenarios to test cyber resilience and communicate those results as a way to make abstract risks more tangible and relatable to stakeholders. This approach facilitates informed decision-making and enables them to discuss pros, cons, and recommended courses of action.Related:By employing these strategies, CISOs can ensure executives and board members have the necessary business context to understand and support cybersecurity decisions, both in day-to-day operations and during critical cybersecurity incidents. By framing cybersecurity initiatives and risks in terms of how they align with and support overall business goals, security leadership can more effectively communicate the reasons for different cyber decisions and ensure that the board understands business risks as they relate to cybersecurity threats.A Three-Layer Shield of DefensibilityIn an era of regulatory upheaval and increasingly sophisticated threat actors, many CISOs are held accountable for cybersecurity incidents that have materially impacted -- or are likely to impact -- their organizations strategy, operations, or financial stability. While the SEC rule applies primarily to public companies, every CISO feels the pressure to protect both their careers and their organizations.Building a strong shield of defensibility, inclusive of the three layers below, collectively protect the CISO and the organization they serve:A system of record that thoroughly documents all cybersecurity effortsA comprehensive cybersecurity program that aligns with industry frameworksA strong communication plan on how cyber risks translate into business objectives and impactsBy fostering a culture of security, responding quickly and accurately during crises, and strategically communicating about cyber risks to the business, this cohesive approach fortifies both CISOs and organizations against cyber threats and regulatory scrutiny.
    0 التعليقات ·0 المشاركات ·33 مشاهدة