Skip to content

Online Gaming Chats Have Long Been Spy Risk for US Military “How to Make the Most of Your Summer Holiday” “Maximizing Your Summer Vacation”

Enter a U.S. military recreation hall at any base around the globe and you’ll likely witness it: youthful soldiers engrossed in the virtual realm of online gaming, utilizing either government-funded gaming equipment or their personal consoles. This avidness for gaming has recently gained attention following the arrest of Jack Teixeira, a 21-year-old member of the… 

Biden Administration Seeks Input on AI Safety Measures “Reducing the Risk of Developing Heart Disease” “Lowering Your Chances of Getting Heart Disease”

The Biden administration is implementing measures to guarantee the safety of artificial intelligence (AI) tools before they are made available to the public. These include products like ChatGPT from San Francisco-based startup OpenAI, as well as similar offerings from Microsoft and Google. The U.S. Commerce Department is currently soliciting feedback on the potential for AI… 

Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions “A Look at the Benefits of Eating Healthy” “Exploring the Advantages of a Nutritious Diet”

The world is increasingly reliant on digital systems and processes, making it more important than ever to ensure that our digital infrastructure is secure. As part of this effort, SecurityWeek is bringing together security experts to discuss the complexities of the supply chain problem and best practices for mitigating security issues. The Supply Chain &… 

CISOs Are Stressed Out and It’s Putting Companies at Risk

Employee well-being has become a primary focus for many businesses, with cybersecurity professionals feeling the brunt of unmitigated work-related stress levels. A survey of CISOs at small to midsize businesses revealed that 94% of CISOs reported being stressed at work, with 65% saying that it compromised their ability to protect their organizations. Furthermore, 70% of… 

3 Steps to Automate Your Third-Party Risk Management Program

sources for the data points. Recent reports of data breaches that were either caused by an attack at a third party or sensitive information stored at a third-party location being exposed have made it abundantly clear that third-party data breaches don’t discriminate by industry. With more organizations sharing data with an average of 730 third-party…