This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
which I've now included in this book 😊 These are the stories behind the stories and finally, the book about it all is here: I announced the book back in April last year after Rob, Charlotte and I had already invested a heap of effort before releasing a preview in October. This book has it all. Pat Phelan.
So, this is a blog post about a book about blog posts. It all began when Rob Conery reached out a few years ago and said "dude, we should totally turn a bunch of your blog posts into a book" to which I replied, "why?" I mean they're all up on my blog anyway, why on earth would anyone want to read them just stuffed into a book?
I post lots of pics to my Facebook account , and if none of that is interesting, here's this week's video on more infosec-related topics: References Sponsored by: Cyberattacks are guaranteed. Is your recovery? Protect your data in the cloud. Join Rubrik’s Cloud Resilience Summit.
2021-2030) A Surge in Demand for InfoSec people will result in many more professionals being trained and placed within companies, likely using more of a trade/certification model than a 4-year university model. That’s the distant future of InfoSec, with humans playing less and less a part in the equation as time goes on.
The Threat Modeling Book has been featured on a list of resources by Digital Guardian. Thanks to the kind folks Digital Guardian for including my threat modeling book in their list of " The Best Resources for InfoSec Skillbuilding." It's particularly gratifying to see that the work is standing the test of time.
Thanks to the kind folks Digital Guardian for including my threat modeling book in their list of “ The Best Resources for InfoSec Skillbuilding.” ” It’s particularly gratifying to see that the work is standing the test of time.
The big book of passwords. There’s one password management tool which experiences more than its fair share of derision—the oft-maligned Internet password book. These are, as you may expect, physical books which are little more than empty notepads with “Internet password book” written on the front. This isn’t uncommon.
Discover the latest on her new book about secure coding, exciting updates in Application Security, and the use of AI in security. Learn how her new book goes deeper into secure coding practices, backed by her [] The post Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book appeared first on Shared Security Podcast.
The ideas will cover multiple aspects of InfoSec, from organizational structure to technology. At the highest level, I think the big change to InfoSec will be a loss of magic compared to now. HT to Jeremiah Grossman to also being very early to seeing the role of insurance in InfoSec. Org Structure. Technology. Regulation.
I absolutely respect Bruce Schneier a lot for what he's contributed to InfoSec, which makes me that much more disappointed with this kind of position from him. InfoSec is full of those people, and it's beneath people like Bruce to add their voices to theirs. And I'm trying to write a book that will help navigate this.
Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of social engineering. I read a lot of Choose Your Own Adventure books and I always loved them,” Koziol continued. “As The employees at your organization are badly in need of security awareness training.
Kevin was a friend and as I say in this week's video, probably the most well-known identity in infosec ever, and for good reason. He made a difference, and I have fun memories with him 😊 Felt really sad waking up and seeing “RIP Kevin” in my timeline.
If you are inspired by any of this and want to learn more about architectural patterns at scale, so you could start to develop some of your own and think how can we transform information security, my book ( Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain ) may help with that in terms of inspiring your thinking (..)
I see this sentiment a lot from a lot of people in infosec, and I think I’ve figured it out. I think a massive amount of the infosec conference scene is people in Live Music Mode. Basically, it’s the opposite of what John Strand said here: Can we all agree that pre-recorded Conference talks are horrible? I mean… Why?
We’re back from our summer break as we ask how did a cryptomining campaign stay unspotted for years, quiz special guest and infosec rockstar Mikko Hyppönen about his book, and ponder what spiders teach us about misinformation.
begging questions about which infosec-related matters are particularly important, and how they stack up in relation to other business priorities, issues, pressures etc. In addition to the technical and human aspects of infosec, there are broader governance, strategic and commercial implications of [information] risk management and assurance.
Siegel and Mark Sweeney Publisher: Auerbach/CRC Press ISBN: 978-0-367-45817-1 Price: ~ US$100 + shipping from Amazon Outline This book lays out a systematic process for developing corporate strategy in the area of cyber (meaning IT) security and resilience. The book makes it a little easier. This stuff is hard.
OSINT Using Your Phone’s Address Book’ appeared first on Security Boulevard. Our sincere thanks to Security BSides Athens for publishing their Presenter’s Security BSides Athens 2022 Conference content on the organization’s’ YouTube channel.
Since 2007 the InfoSec industry has been talking about TheBigOne™—the event that would change cyber threats from annoyances to existential concerns. They called it Cyber Pearl Harbor. This doesn’t mean it can’t still happen. If you get value from this content, you can support it directly by becoming a member.
The post Episode 209: Fortinet’s Renee Tarun on Scaling InfoSec To Meet Tomorrow’s Challenges appeared first on The. Fixing InfoSec Demands Scale, Diversity. We also talk about her latest project: a children’s book to educate kids about basic cyber security concepts. . Read the whole entry. »
In the case of corporate infosec that’s the business, and in the consumer world it’s the business of human thriving. —. Being a member gets you access to the newsletter every week instead of just twice a month, access to the UL Slack Channel, the UL Book Club, the UL Archives, and access to future member-only content.
Companies Prioritise Downplaying Severity and Covering Their Arses During one disclosure, I had the good fortune of a very close friend of mine working for the company involved in an infosec capacity. They were clearly stalling, being well over a week from my disclosure yet no public statements or notices to impacted individuals.
Recon Infosec is a growing managed security services provider run by a team of seasoned cybersecurity experts. All-star security team seeks a better solution Recon Infosec is not your average managed detection and response (MDR) provider. But for Recon Infosec, finding an alternative to its existing security stack was challenging.
As part of ChargePoint’s commitment to customer security, the company encourages researchers to collaborate with ChargePoint InfoSec to identify potential new vulnerabilities in its products or environment. For more information, please email the InfoSec team at: infosec@chargepoint.com.
Insurance claims from cyber/ransomware events have consumed up to 40% of the claims of some insurers’ cyber books. Have insurers and infosec professionals coordinate closely on security risk metrics. However, that landscape has faded fast – threatening the very availability of cyber insurance for ransomware.
The theme is often breaking into infosec. It’s usually quite difficult for them to get people booked in to speak about things. Again, I think this just fits in with broadening female students’ horizons to the world of infosec and giving them confidence that they will be just as valued as our male colleagues.
The company has been honored by the Cybersecurity Breakthrough Awards, the Globee Information Technology Awards, TMCNet Zero Trust Security Excellence Awards, Cybersecurity Excellence Awards, Fortress Cybersecurity Awards, and the Global InfoSec Innovator award. Media contact: Shannon Cieciuch, Touchdown PR, traceable@touchdownpr.com
Booth babes and rampant sexism were more of a problem in infosec in the past. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. WANG : In leadership roles, I don't know that I think the overall percentage of women in cyber InfoSec is like 22%. So I learned.
We only had Infosec Europe and the most we got out of there was some free USB sticks… If we were lucky they would be 500 megs. It’s so easy to manipulate anyone that works in infosec. Yeah, infosec is full of characters. When I started there were no such things as conferences such as BSides.
However, we all know infosec/cyber/IT is awesome at intelligently assessing risk … right? Detecting timing analysis perhaps calls for further study (and reminds me of this book ) So, thoughts? :-) Thanks to Brandon Levene for his super insightful comments! Related posts: “Can We Have “Detection as Code”?”
We then compiled their answers into an e-Book, Lifting Each Other Up: A Celebration of Women in Cybersecurity and Their Advocates. . This resource illuminates how some of today’s leading infosec women experts got started in the cybersecurity industry and embraced the common goal of creating a more secure world for everyone.
Verizon’s Breach Report is one of the best infosec reports out there, and I’m always excited when I hear it’s been released. He looks at the key findings and talks about what they might mean to us going forward. The newsletter serves as the show notes for the podcast. The Dataviz Game on Point.
If you’re new to the information security field, or are looking to take your first steps towards a new career in InfoSec, the KLCP is a “must have” foundational certification. New Book - Kali Linux Revealed Mastering the Penetration Testing Distribution More exciting news!
The post DEF CON 29 Main Stage – Slava Makkaveev’s ‘I Know How To Take Over Your Kindle With An E-Book’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEFCON Conference Main Stage Videos on the groups' YouTube channel.
In this episode learn all about the world of corporate spying from someone who was a corporate spy and actually wrote a book on it! Robert Kerbeck author of “RUSE: Lying the American Dream from Hollywood to Wall Street” joins us to discuss his fascinating career as a corporate spy, life as a struggling actor, […].
RSA has been action-packed, meeting with customers, showing off our new product enhancements, and booking time with new prospects. On Monday we picked up our trophy for winning ‘Hot Company’ in API security in the Global InfoSec Awards. What a week we’re having – and it’s only Thursday! But that’s not all!
I'm currently enjoying another book by one of my favourite tech authors: Yossi Sheffi's The Resilient Enterprise *. Even at full price, this book is a bargain, well worth t: now it's a steal! Just a brief note today: it's a lovely sunny Saturday morning down here and I have Things To Do. Grab it while it's hot!
We celebrate their contributions to InfoSec, elevating everyone in the cybersecurity profession—today's heroes. Her work birthed intrusion detection systems and the legendary "Orange Book," fortifying our digital world against chaos. If you are fighting the good fight against the myriad of digital threats, you too are a cyber hero!
In this week's episode of the podcast: Joseph Menn's new book Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World hit store shelves this week. That scoop helped propel Menn’s book to become a top selling cyber security book on Amazon even before it was released. We're joined.
Book launch: The Privacy Leader Compass On Wednesday January 17th, join us for the launch of “The Privacy Leader Compass”, a groundbreaking book by BH Consulting COO Dr. Valerie Lyons, and Todd Fitzgerald, CISO, cybersecurity and privacy leadership author. Book your place at the link below.
I’m not originally from the InfoSec world. I would love to recommend a slew of books to give you a wealth of acting knowledge, but the only book that ever gave me a palpable bump in my craft is Impro by Keith Johnstone the “Father of Improv.” Acting Skills and Training.
He recognized my passion for infosec (it wasn’t called cyber back then) and provided me with the support needed to make my ideas and projects a reality. Thanks to him I was able to co-found one of the first infosec consulting businesses in Spain in 2000, and I’m still very grateful for that opportunity. Great book by the way!).
As such, when you think about everything, be it basic security hygiene, information risk management, or even behavioral infosec, you must first consider how it fits with org culture. Behavioral InfoSec. Instead, be aware that your basics come first (out of necessity), then comes some form of risk mgmt.,
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content