Search the site
Industry Insights
Podcasts
Briefings
Stories
Events
Glossary
N2K Pro
CSO Perspectives
Podcasts
Briefings
Pro Academy
New
Hash Table
1
st
Principles Course
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
Dev
API
Account
Profile
Logout
Home
Search the site
Industry Insights
Podcasts
Briefings
Stories
Events
Glossary
N2K Pro
CSO Perspectives
Podcasts
Briefings
Pro Academy
New
Hash Table
1
st
Principles Course
Dev
API
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
September 14, 2024
Join Pro
LOGIN
Stories
Story
Sep 11, 2024
A CSO’s 9/11 Story.
Rick Howard, N2K’s CSO, Chief Analyst, and Senior Fellow, recounts his experience from inside the Pentagon running the communications systems for the Army Operations Center.
Story
Sep 5, 2024
CertByte: Project Management Professional (PMP)® by Project Management Institute®
On this edition of CertByte, we discuss a question from N2K’s Project Management Professional (PMP)® practice test. As your news-to-knowledge partner, N2K strives to advance your professional growth while bringing you the industry news and trends that help you stay a step ahead. We recently launched CertByte, our new bi-weekly segment on the CyberWire Daily podcast, and these companion articles to support your certification journey and fast-track your career growth in IT, cybersecurity, and project management. As your host, I’ll share a practice question from N2K’s suite of industry-leading content and a study tip to increase your confidence and readiness on exam day.
Story
Aug 13, 2024
Need to know: NIST finalizes post-quantum encryption standards essential for cybersecurity.
Discover NIST’s newly finalized post-quantum encryption standards designed to protect against future quantum threats. Learn why immediate adoption is crucial for cybersecurity and how these standards will secure sensitive data in the quantum era.
CSO Perspectives
Aug 12, 2024
What does materiality mean exactly?
Rick Howard discusses the meaning of cybersecurity materiality.
CSO Perspectives
Aug 5, 2024
Cybersecurity is radically asymmetrically distributed.
Rick Howard discusses the idea that Cybersecurity is Radically Asymmetrically Distributed. It means that cybersecurity risk is not the same for all verticals and knowing that may impact the first principle strategies you choose to protect your enterprise.
Story
Jul 31, 2024
How fintech’s meteoric rise has resulted in society trading security for convenience.
Explore the rapid rise of fintech and its impact on society in this insightful article. Discover how financial technology has revolutionized financial services, offering unparalleled convenience but raising significant security and regulatory concerns. Learn about the risks of cyberattacks, data breaches, and the need for stronger regulations. Gain practical advice on how users and businesses can protect themselves by adopting robust security measures and working with trusted providers. Don’t miss key insights and strategies to navigate the evolving fintech landscape and an exclusive offer to attend the Finance & Accounting Technology Expo.
Story
Jul 30, 2024
Navigating the Current Name Screening Landscape: Opportunities with AI and Large Language Models
Discover how artificial intelligence (AI) and large language models (LLMs) are revolutionizing financial crime compliance. Learn about the current challenges in name screening, the transformative potential of AI and LLMs, and strategies for successful implementation to reduce false positives and operational inefficiencies.
Press
Jul 24, 2024
Microsoft’s The BlueHat Podcast joins the N2K CyberWire network.
N2K Networks, a leader in cyber workforce intelligence, today announced the launch of The BlueHat Podcast, the latest podcast from the Microsoft Security team to join the leading cybersecurity media network. The show will air on the N2K CyberWire network and joins the ranks of other popular Microsoft Security podcasts, including The Microsoft Threat Intelligence Podcast, Afternoon Cyber Tea with Ann Johnson, and Uncovering Hidden Risks.
Story
Jul 19, 2024
Need to know: understanding the CrowdStrike-induced Microsoft outage, impact, response, and lessons learned.
An in-depth look at the global Microsoft disruptions caused by a misconfigured CrowdStrike update and the subsequent recovery efforts.
CSO Perspectives
Jul 15, 2024
Current state of MITRE ATT&CK: the essential tool to support the Intrusion Kill Chain Prevention Strategy.
Rick Howard discusses MITRE ATT&CK with Frank Duff, Amy Robertson, and Rick Doten
Press
Jun 27, 2024
WiCyS and N2K Networks Launch Joint Cyber Talent Study
N2K Networks, a leader in strategic cyber workforce intelligence, in partnership with Women in CyberSecurity (WiCyS), a nonprofit organization dedicated to the recruitment, retention, and advancement of women in cybersecurity, is proud to announce the release of the Cyber Talent Study. This groundbreaking report leverages skills data from the professional members of WiCyS, and offers valuable insights into cybersecurity competencies within the industry.
CSO Perspectives
Jun 17, 2024
The current state of XDR: A Rick-the-toolman essay.
Rick Howard discusses XDR with Rick Doten, and Milad Aslaner.
Load More