This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
I think there are four main trends that will play out in the field of informationsecurity in the next 20 years. 2021-2030) A Surge in Demand for InfoSec people will result in many more professionals being trained and placed within companies, likely using more of a trade/certification model than a 4-year university model.
Join us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in Application Security, and the use of AI in security.
I’m starting a new series with this 2022 edition where I think about what InformationSecurity could or should look like in the distant future—say in 2050. The ideas will cover multiple aspects of InfoSec, from organizational structure to technology. Org Structure. Technology. Regulation. Automation / AI. The arcane.
Kathleen Moriarty's opening line for her presentations at two upcoming SecureWorld virtual conferences tee up nicely the deep insights she will provide: "T he topic of transforming informationsecurity is a big one, but we are at a unique period of time for security," said Moriarty, Chief Technology Officer at the Center for Internet Security, based (..)
begging questions about which infosec-related matters are particularly important, and how they stack up in relation to other business priorities, issues, pressures etc. begging questions about which infosec-related matters are particularly important, and how they stack up in relation to other business priorities, issues, pressures etc.
I see this sentiment a lot from a lot of people in infosec, and I think I’ve figured it out. I think a massive amount of the infosec conference scene is people in Live Music Mode. Basically, it’s the opposite of what John Strand said here: Can we all agree that pre-recorded Conference talks are horrible? I mean… Why?
The informationsecurity industry needs both better tools to fight adversaries, and more people to do the fighting, says Fortinet Deputy CISO Renee Tarun in this interview with The Security Ledger Podcast’s Paul Roberts. The informationsecurity industry is simultaneously robust and beset by problems and challenges.
Since 2007 the InfoSec industry has been talking about TheBigOne™—the event that would change cyber threats from annoyances to existential concerns. They called it Cyber Pearl Harbor. This doesn’t mean it can’t still happen. If you get value from this content, you can support it directly by becoming a member.
In the case of corporate infosec that’s the business, and in the consumer world it’s the business of human thriving. —. Being a member gets you access to the newsletter every week instead of just twice a month, access to the UL Slack Channel, the UL Book Club, the UL Archives, and access to future member-only content.
Mukkavilli “ChargePoint is committed to the security of all customer data, and through this collaboration, we’ve implemented critical enhancements to Home Flex,” said Teza Mukkavilli, Chief InformationSecurity Officer of ChargePoint. For more information, please email the InfoSec team at: infosec@chargepoint.com.
The TRIAD Model During my career as a CISO, I relied on my TRIAD Model to envision, enact, and mobilize InformationSecurity & Privacy strategic planning and roadmap execution activities with foundational pillars as illustrated below. Business continuity plans can help mitigate disruptive incidents.
The theme is often breaking into infosec. I get to dust off some oldies and give a snapshot of security research circa [insert year of choice here]. It’s usually quite difficult for them to get people booked in to speak about things. Every year, I take part in talks for universities and schools. It’s a win-win for everybody.
If you’re new to the informationsecurity field, or are looking to take your first steps towards a new career in InfoSec, the KLCP is a “must have” foundational certification. New Book - Kali Linux Revealed Mastering the Penetration Testing Distribution More exciting news!
States also differ on other data privacy and IT security compliance laws. The states of Nevada, Minnesota and Washington stand out for having their own laws on the books creating liability in certain situations for businesses that handle credit card transactions and are not in compliance with PCI-DSS.
Verizon’s Breach Report is one of the best infosec reports out there, and I’m always excited when I hear it’s been released. He looks at the key findings and talks about what they might mean to us going forward. The newsletter serves as the show notes for the podcast. The Dataviz Game on Point.
Booth babes and rampant sexism were more of a problem in infosec in the past. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. What if you are a woman in informationsecurity? That is, until Chenxi Wang spoke up. So I learned. And the good news?
The post DEF CON 29 Main Stage – Slava Makkaveev’s ‘I Know How To Take Over Your Kindle With An E-Book’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEFCON Conference Main Stage Videos on the groups' YouTube channel.
In this week's episode of the podcast: Joseph Menn's new book Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World hit store shelves this week. Also: is the talent pipeline for informationsecurity empty, or has it sprung a leak? Solving Infosec’s Pipeline Problem. We're joined.
It's been resoundingly well-received by both browsers to the site and the sponsors themselves and I've already booked 2019 out until August. Who knows, maybe this is something I'll even write more about in 2019 if there's an appetite. The sponsorship model continued strongly too. Speaking Geez, where to start.
In this episode learn all about the world of corporate spying from someone who was a corporate spy and actually wrote a book on it! The post Robert Kerbeck Author of RUSE: Lying the American Dream from Hollywood to Wall Street appeared first on The Shared Security Show.
InformationSecurity is no different. We celebrate their contributions to InfoSec, elevating everyone in the cybersecurity profession—today's heroes. A pioneer in cryptography, computer security, and information warfare, she was a relentless guardian of the cyber realm.
military and serving as deputy chief informationsecurity officer at Globe Life and global informationsecurity risk director at GM Financial. As an infosec leader, Vaughn witnessed first-hand the dearth of available IT talent that’s available to hire. and Canada.
I am currently drafting a guideline on informationsecurity, privacy, governance, compliance and other controls to mitigate unacceptable information risks in professional services. Guess whose interests they are most likely to protect!
Twitter infosec is the top 10%, at best, arguing with each other. I had a crazy idea this morning that I don't actually believe, but thought would be a great book idea. And therefore knowing how your stimuli will affect outcomes. What do you think the stat is for those without CIOs? Probably also zero. Don’t want to patch?
An I nformation S ecurity M anagement S ystem facilitates the management of information risks, informationsecurity controls, governance and assurance arrangements and so forth, 'systematically' i.e. in a structured and coherent way. This is a great opportunity to take the first step on your mission!
From his origins as a professional wrestler who once bravely faced off […] The post How to Break Into a Cybersecurity Career – Phillip Wylie appeared first on Shared Security Podcast. Join us as we discuss Phillip’s unique journey and uncover valuable insights on breaking into the cybersecurity field.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.
As we head to Hacker Summer Camp, how should we rebuild our infosec communities to be more inclusive and diverse? I'm attending in person this year, as are a lot of people in the InfoSec world. Rather, I choose to see this as a fresh start to create a new community within InfoSec. Jack Daniel offers his unique voice.
Suffice to say that wasn’t the case : ) I cover some books/courses/other references that have helped me on the journey at the end of this post for anyone interested. Machine Learning Books. “ The 100 Page Machine Learning Book ” is a great, fairly short overview (with some math) of most ML concepts. Machine Learning Books. “
His book, Hacking Google was a best seller, but after, he just wasn't feeling it. Vamosi: Burnout is a major concern in the InfoSec world. Vamosi: Unlike what you might see on TV or in the movies, or in a book, hackers, are indistinguishable from anyone else. Jack has been chronicling other people in InfoSec.
Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving informationsecurity space. Security technologist Bruce Schneier was respected long before the launch of Twitter. The book will focus on cutting edge web red team, pentester, and bug bounty topics.
The Certified Information Systems Security Professional (CISSP) certification is considered to be the gold standard in informationsecurity. Those doors lead to many different types of positions and opportunities, thus making the informationsecurity community dynamic and multifaceted. I did two things.
I’m Robert Vamosi and in this episode I’m talking about online criminal investigations conducted by someone who is inside the infosec community, and how your social media posts -- no matter how good you think you are about hiding -- can reveal a lot about your true identity. Daniel, he keeps a low profile. CLEMENS: I do.
And that's just because it's not in the books VAMOSI: True. A lot of infosec’s knowledge is either tribal -- passed on from one person to another - or can be found in books. Checkout the Cqure Academy to learn more about informationsecurity. We’re here to help each other learn about security.
In the book, McGilchrist explores the two hemispheres of the brain and how they “experience” the world differently. This hierarchy allows us to talk about attacks at numerous levels of resolution or abstraction, but what does that ability provide for us?
We could also have a massive network of technical support, using people in infosec who already have jobs. Being a member gets you access to the newsletter every week instead of just twice a month, access to the UL Slack Channel, the UL Book Club, the UL Archives, and access to future member-only content.
Last year at Hacker Summer Camp I was invited to Mikko Hypponen’s book launch for If it’s Smart, It’s vulnerable. But now you know, the rise of cybercrime like that's actually problematic and it's a bad idea to make that your start into informationsecurity. VAMOSI: I am not a gamer. It's pretty fantastic.
There’s an online war in Ukraine, one that you haven’t heard much about because that country is holding its own with an army of infosec volunteers worldwide. Vamosi: The slogan of the RSA Conference is “Where the World Talks Security,” and, in general. RSAC also attracts some of the top researchers in infosec.
Having a common framework around vulnerabilities, around threats , helps us understand the infosec landscape better. Adam Shostack has a new book, Threats: What Every Engineer Should Learn From Star Wars. Adam has more than 20 years in the infosec world, and he even helped create the CVE system that we all use today.
Should infosec now be considered vocational training just like becoming an electrician or a plumber? How else should we address the skills gap in infosec? My boss at the time didn't know much about infosec. She died a few years ago, but I believe the book continues with other authors. I was a paid writer--whoo, whoo.
Vamosi: DEF CON turns 30 This year what began simply as a going away party for a coworker has since evolved over the decades into an annual summer tradition for InfoSec leaders in Las Vegas, which now includes other events such as besides Las Vegas, Diana is known as hackers summer camp. Again, all all around the InfoSec community.
So there’s a need, a definite need, for informationsecurity professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. It gets lost.
In 2004, Nokia and Ericsson admitted that some of their Bluetooth-enabled devices were vulnerable to unauthorized access to information from a wireless device through a Bluetooth connection, called “bluesnarfing”. This means a threat actor could read, modify and copy users’ address books and calendars without leaving any trace.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content