Remove Book Remove Encryption Remove InfoSec
article thumbnail

Thinking About the Future of InfoSec (v2022)

Daniel Miessler

The ideas will cover multiple aspects of InfoSec, from organizational structure to technology. At the highest level, I think the big change to InfoSec will be a loss of magic compared to now. HT to Jeremiah Grossman to also being very early to seeing the role of insurance in InfoSec. Org Structure. Technology. Regulation.

InfoSec 180
article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

At the same time, we also have changes at every layer of the protocol stack and this is driven by an increased push for encryption—not just encryption, strong encryption.". We're responsible for the CIS benchmarks and the CIS controls.

InfoSec 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Are You NOT Detecting?

Anton on Security

However, we all know infosec/cyber/IT is awesome at intelligently assessing risk … right? Sometimes the timing makes a difference between a success (catching ransomware before it encrypts) and a failure (like, I dunno, detecting ransomware by looking for a ransom note). Related posts: “Can We Have “Detection as Code”?”

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

The states of Nevada, Minnesota and Washington stand out for having their own laws on the books creating liability in certain situations for businesses that handle credit card transactions and are not in compliance with PCI-DSS. States also differ on other data privacy and IT security compliance laws.

article thumbnail

The bad old days

Javvad Malik

We only had Infosec Europe and the most we got out of there was some free USB sticks… If we were lucky they would be 500 megs. It’s so easy to manipulate anyone that works in infosec. Yeah, infosec is full of characters. When I started there were no such things as conferences such as BSides.

Passwords 113
article thumbnail

The Rise of Data Sovereignty and a Privacy Era

SecureWorld News

Building a strong incident response plan with play books and calibrating regularly via tabletop exercises with cross functional stakeholders is paramount. Traditionally, InfoSec lies within the IT organization, and Privacy is housed inside the Legal department. Business continuity plans can help mitigate disruptive incidents.

IoT 107
article thumbnail

The Kali Linux Certified Professional

Kali Linux

If you’re new to the information security field, or are looking to take your first steps towards a new career in InfoSec, the KLCP is a “must have” foundational certification. New Book - Kali Linux Revealed Mastering the Penetration Testing Distribution More exciting news!