Advertisement

Maine Native named Chief Information Security Officer of the Year

maine native named chief information security officer of the year

BEGIN ARTICLE PREVIEW:

Aimee Barricelli has been named 2020 Chief Information Security Officer of the Year. Courtesy photo
Aimee Barricelli, senior vice president, chief information security officer, at Webster Bank in Waterbury, Connecticut — who has ties to Old Orchard Beach — has been named 2020 Chief Information Security Officer of the Year by the American Cyber Awards. The national awards program reviews the industry, searching for those who are pushing the boundaries in the fight against cybercrime.
The CISO of the Year award honors an exceptional leader who has the attention of his or her board, a record for delivering results and a drive for creating a security culture throughout the company.
“Aimee and her team have utilized next-gen security strategy to improve visibility in an increasingly complex environment,” said Karen Higgins-Carter, executive vice president, Chief Information Officer at Webster, adding, “They’ve created an even more compliant, secure space with cutting-edge innovations that maintain a smooth customer experience.”
Barricelli’s mother lives in Old Orchard Beach.

filed under:

Related Stories

Latest Articles

American Journal

American Journal

Local & State

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE

Why it’s time to rethink information security

why it’s time to rethink information security

BEGIN ARTICLE PREVIEW:

advertisementThe pandemic has fueled a process of rapid digitization that’s transforming how people work and has huge implications for the way organizations will operate.advertisementThe pandemic has accelerated several trends we’ve been watching for years, from the adoption of cloud-based business processes and seamless collaboration, to the protection of employees and systems from “bad actors”.While many organizations were already embracing these trends, many more are now experiencing how these technologies allow them to create new ways of working, rethink the customer experience, develop new business models, and find new markets.Managing digital platformsBut the wide-scale adoption of digital platforms comes with challenges that must be managed closely, especially those that relate to document security, end point protection, and backup.Let me give you an example around ransomware, where a “bad actor” takes control of your device and asks for ransom to return access. This presents two threats: first, the loss of control of your machine, data and information – possibly permanently. A backup just prior to the attack remedies this threat.The second threat is that they will sell your information to the highest bidder. Storing the data in a highly fragmented way in the cloud – and only …

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “Why it’s time to rethink information security”

Twitter now supports hardware security keys for iPhones and Android

twitter now supports hardware security keys for iphones and android

BEGIN ARTICLE PREVIEW:

Twitter said Wednesday that accounts protected with a hardware security key can now log in from their iPhone or Android device.
The social media giant rolled out support for hardware security keys in 2018, allowing users to add a physical security barrier to their accounts in place of other two-factor authentication options, like a text message or a code generated from an app.
Security keys are small enough to fit on a keyring but make certain kinds of account hacks near impossible by requiring a user to plug in the key when they log in. That means hackers on the other side of the planet can’t easily break into your account, even if they have your username and password.
But technical limitations meant that accounts protected with security keys could only log in from a computer, and not a mobile device.
Twitter solved that headache in part by switching to the WebAuthn protocol last year, which paved the way for bringing hardware security key support to more devices and browsers.
Now anyone with a security key set up on their Twitter account can use that same key to log in from their mobile device, so long as the key is …

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “Twitter now supports hardware security keys for iPhones and Android”

Expert Reaction On Half Of All Docker Hub Images Have At Least One Critical Vulnerability

expert reaction on half of all docker hub images have at least one critical vulnerability

BEGIN ARTICLE PREVIEW:

It has been reported that a new security analysis of 4 million container images hosted on the Docker Hub repository revealed that over half contained at least one critical vulnerability and thousands contained malware or potentially harmful applications.

Experts Comments

Container images are a combination of an application.

Container images are a combination of an application with operating system elements and supporting frameworks. Development teams creating distributed systems following a microservice or cloud native philosophy will select third-party container images to perform one of two functions. Either the container image is used “as is” to provide a shared service, such as with a database, or will be embe…..Read MoreContainer images are a combination of an application with operating system elements and supporting frameworks. Development teams creating distributed systems following a microservice or cloud native philosophy will select third-party container images to perform one of two functions. Either the container image is used “as is” to provide a shared service, such as with a database, or will be embedded as a base image to create a new container image. In both situations, the design and security practices of the team creating the original container image have a direct impact on the …

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “Expert Reaction On Half Of All Docker Hub Images Have At Least One Critical Vulnerability”

Vendor Contracts Poised to Become ‘Work of Art’ as Cybersecurity Dangers Grow

vendor contracts poised to become ‘work of art’ as cybersecurity dangers grow

BEGIN ARTICLE PREVIEW:

The potential for cyber incidents is basically a fact of life for businesses and their corporate legal departments. However, with 2020 serving up a few prominent reminders that even legal providers are not immune from the attention of hackers, it’s possible that the segments of master services agreements dealing with cyber remediation may continue to balloon over the next few years. 

To be sure, extra precautions are not entirely without merit. In late February, Epiq took its global systems offline after detecting unauthorized activity that turned out to be a Ruyk ransomware attack. Law firms have not been immune to cyber crime either, with Seyfarth Shaw among the latest high-profile targets to join a growing list of ransomware targets in October. 

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “Vendor Contracts Poised to Become ‘Work of Art’ as Cybersecurity Dangers Grow”

FOX43 Finds Out: Billions of cyber attacks were stopped this year

fox43 finds out: billions of cyber attacks were stopped this year

BEGIN ARTICLE PREVIEW:

Internet Service Providers say they stopped more than 100 potential attacks per household. FOX43 Finds Out the steps you can take to keep your devices secure.

HARRISBURG, Pa. — Rising COVID-19 case counts here in PA have a lot of people working or taking classes from home again.

That means hackers are working overtime, hoping you fall for a scam.

Comcast reports 95 percent of consumers grossly underestimate the volume of cyberattacks they face each month.

FOX43 Finds Out some of the simple steps you can take to guard your information against a grinch.

Once the calendar flips to December a lot of us fall into a so-called “holiday mode.”

Between buying gifts, finishing work for the year, and the coronavirus pandemic, we can easily get distracted.

Terrill Frantz, an associate professor of e-business and cybersecurity at Harrisburg University says, “It’s prime season for a cyber sleuth to catch you off guard.”

An information security officer for Comcast says that the company alone stopped more than 6 billion attacks in 2020.

Noopur Davis, Comcast’s EVP Chief Product and Information Security Officer said, “On average, we stopped 104 attacks per household, per month, this year.”

We know some of the reasons why this is happening: Getting your …

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “FOX43 Finds Out: Billions of cyber attacks were stopped this year”

MaxQ AI Leads AI Security with ISO 27799 Certification for Health Informatics Information Security and ISO 27001 Recertification

maxq ai leads ai security with iso 27799 certification for health informatics information security and iso 27001 recertification

BEGIN ARTICLE PREVIEW:

New healthcare information security certification demonstrates commitment to the highest standards of data protection across the company’s operations, systems, and products
TEL AVIV, Israel (PRWEB) December 02, 2020
MaxQ AI, the industry-leading healthcare technology company that delivers comprehensive clinical workflow solutions assisting with improved patient triage and diagnosis, announced today that after undergoing stringent reviews by the British Standards Institution (BSI), it has achieved ISO 27799 certification and ISO 27001 recertification. Both certifications are widely recognized international standards for information security management systems. These standards separate MaxQ in its commitment to deploying the Accipio Clinical Platform as a comprehensive, seamless, and secure solution for the healthcare industry.
MaxQ’s ISO 27001 and 27799 certifications attest to its commitment to securing development lifecycle management, data integrity, and privacy. “Although ISO 27001 certification is not required by any regulatory body at this time, MaxQ AI chose to pursue these ISO standards because of the importance of providing secure healthcare solutions while adhering to the highest industry security standards. Our mission is patient safety, and we see security as part of that mission,” said Robert Mehler, Co-Founder, Chief Operating Officer, and Chief Information Security Officer for MaxQ AI. “Cybersecurity is a threat that goes far beyond lost revenue and expenses. An …

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “MaxQ AI Leads AI Security with ISO 27799 Certification for Health Informatics Information Security and ISO 27001 Recertification”

emocha Health Wins the Annual Ostendio MyVCM Trust Network Award for Cybersecurity and Compliance Excellence

emocha health wins the annual ostendio myvcm trust network award for cybersecurity and compliance excellence

BEGIN ARTICLE PREVIEW:

ARLINGTON, Va., Dec. 2, 2020 /PRNewswire/ — Ostendio, a leading integrated risk management platform provider, has announced that emocha Health is the winner of the company’s fifth annual MyVCM Trust Network Award. emocha provides Digital Medication Adherence Programs through asynchronous video check-ins and scalable human engagement to help patients radically improve medication adherence. Throughout 2020, emocha has consistently ranked in the top 5 companies on the Ostendio MyVCM platform, which automates security program lifecycles.

Continue Reading

L-R Marc Bandini, Ostendio President and COO and Grant Elliott, Ostendio CEO and chairman present award to Ramon Castro, emocha CTO and Sebastian Seigeur, emocha CEO outside the emocha offices in Baltimore, MD.

emocha, Ostendio and MyVCM Trust Network Awards logos

Companies of all sizes benefit from the Ostendio MyVCM platform, which offers advanced features that improve security audit efficiency and save auditors and customers up to 50 percent of the time and cost needed to complete a security audit. The MyVCM Trust Network Awards highlight companies that demonstrate excellence in continually managing information security, risk, and compliance. Each month, Ostendio reports the top three companies based on their overall compliance activity on the Ostendio MyVCM platform. The company with the highest average ranking throughout the year is announced …

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “emocha Health Wins the Annual Ostendio MyVCM Trust Network Award for Cybersecurity and Compliance Excellence”

Flexible Resourcing Lto Plug The IT Skills Gap

flexible resourcing lto plug the it skills gap

BEGIN ARTICLE PREVIEW:

The relationship between this year’s COVID-19 pandemic, and technology, is no secret. The events of this year have wed a sudden rise in remote working with opportunist cybercriminals preying on vulnerabilities within networks. Meanwhile, that same working from home trend has also driven an acceleration towards cloud adoption. And of course, new forms of working have ushered in the era of the video conferencing tools. The relationship between COVID-19 and technology is resulting in a rapid rate of change, further compounding and worsening an already developing skills gap. Indeed, nine in 10 (88%) organisations admit they have a shortage of digital skills, which is already having a significant negative impact on productivity, efficiency and competitiveness.

As a result, the rate of IT change has never been greater – coupled with the consumerisation of IT, where many employees expect to have the same personalised, seamless IT experience between different devices in the office as they do at home.

This rate of change is one of the critical challenges in the industry for IT skills. As a direct impact and perhaps the most significant upshot of all these pandemic-digitisation relationships, however, is the exposure of the IT skills gap within businesses. IT teams have …

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “Flexible Resourcing Lto Plug The IT Skills Gap”