Future-proofing finance: FS-ISAC’s blueprint for cryptographic agility. [Special Edition]

Future-proofing finance: FS-ISAC’s blueprint ...

Up next

The quietest weapon in America’s loudest strike.

Cyber weapons knock out Iranian air defenses during strikes on nuclear sites. ShinyHunters dump more than a million stolen records from Harvard and Penn. Betterment confirms a breach exposing data from roughly 1.4 million accounts. Researchers uncover a sprawling scam network imp ...  Show more

A softer touch on cyber.

The White House preps a major overhaul of U.S. cybersecurity policy. A key Commerce security office loses staff as regulatory guardrails weaken. Lawmakers Press AT&T and Verizon after months of silence on Salt Typhoon. A vulnerability in the React Native Metro development server ...  Show more

Recommended Episodes

Turing Award Special: A Conversation with Martin Hellman
Software Engineering Daily

Martin Hellman is an American cryptographer known for co-inventing public-key cryptography with Whitfield Diffie and Ralph Merkle in the 1970s. Their groundbreaking Diffie-Hellman key exchange method allowed secure communication over insecure channels, laying the foundation fo ...

  Show more

The Role and Evolution of Virtual CISOs with Craig Taylor
Cybersecurity Today

In this episode of Cybersecurity Today, Jim hosts Craig Taylor, a seasoned virtual Chief Information Security Officer (vCISO) with over 25 years of experience. They discuss the evolution and significance of the vCISO role, Taylor's career path, and the founding of his company, Cy ...  Show more

The Evolving Landscape of Cybersecurity Training: Effective Strategies and Misleading Headlines
Cybersecurity Today

In this episode of Cybersecurity Today, host Jim Love explores the complex dynamics of cybersecurity training with guests Michael Joyce and David Shipley. They discuss the importance of continuous awareness and the temporal decay of training effects. The conversation highlights t ...  Show more