With the rise in popularity of CRISPR gene editing there have been increasing ethical considerations surrounding the storage of genetic information. These considerations include the security measures to limit the access to the data, and how this data should be used once collected. In Hacking Humans: Protecting our DNA From Cybercriminals the author notes the medical advancements resulting…
Budgeting as a CISO: Software vs. Training
With limited budgets Chief Information Security Officers (CISO) have to weigh the cost benefits of where they spend the department’s funds. The decision to increase spending on one item, means a reduction somewhere else. It is important CISOs include a reasonable sized budget for training staff on the risks of cyberattacks; however, the focus should…
Critical Vulnerabilities of SCADA
Critical infrastructures have become reliant on advancing supervisory control and data acquisition networks (SCADA) to maintain operations. With the growing prominence of these systems, cybercriminals have seized the opportunity to make profit off hacking these networks. Organizations who implement SCADA for critical infrastructure must become more diligent in their management of systems to prevent availability…