This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
which I've now included in this book 😊 These are the stories behind the stories and finally, the book about it all is here: I announced the book back in April last year after Rob, Charlotte and I had already invested a heap of effort before releasing a preview in October. This book has it all. Pat Phelan.
I post lots of pics to my Facebook account , and if none of that is interesting, here's this week's video on more infosec-related topics: References Sponsored by: Cyberattacks are guaranteed. Is your recovery? Protect your data in the cloud. Join Rubrik’s Cloud Resilience Summit.
2021-2030) A Surge in Demand for InfoSec people will result in many more professionals being trained and placed within companies, likely using more of a trade/certification model than a 4-year university model. That’s the distant future of InfoSec, with humans playing less and less a part in the equation as time goes on.
The Threat Modeling Book has been featured on a list of resources by Digital Guardian. Thanks to the kind folks Digital Guardian for including my threat modeling book in their list of " The Best Resources for InfoSec Skillbuilding." It's particularly gratifying to see that the work is standing the test of time.
Thanks to the kind folks Digital Guardian for including my threat modeling book in their list of “ The Best Resources for InfoSec Skillbuilding.” ” It’s particularly gratifying to see that the work is standing the test of time.
Discover the latest on her new book about secure coding, exciting updates in Application Security, and the use of AI in security. Learn how her new book goes deeper into secure coding practices, backed by her [] The post Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book appeared first on Shared Security Podcast.
The ideas will cover multiple aspects of InfoSec, from organizational structure to technology. At the highest level, I think the big change to InfoSec will be a loss of magic compared to now. HT to Jeremiah Grossman to also being very early to seeing the role of insurance in InfoSec. Org Structure. Technology. Regulation.
I absolutely respect Bruce Schneier a lot for what he's contributed to InfoSec, which makes me that much more disappointed with this kind of position from him. InfoSec is full of those people, and it's beneath people like Bruce to add their voices to theirs. And I'm trying to write a book that will help navigate this.
Kevin was a friend and as I say in this week's video, probably the most well-known identity in infosec ever, and for good reason. He made a difference, and I have fun memories with him 😊 Felt really sad waking up and seeing “RIP Kevin” in my timeline.
Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of social engineering. I read a lot of Choose Your Own Adventure books and I always loved them,” Koziol continued. “As The employees at your organization are badly in need of security awareness training.
If you are inspired by any of this and want to learn more about architectural patterns at scale, so you could start to develop some of your own and think how can we transform information security, my book ( Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain ) may help with that in terms of inspiring your thinking (..)
I see this sentiment a lot from a lot of people in infosec, and I think I’ve figured it out. I think a massive amount of the infosec conference scene is people in Live Music Mode. Basically, it’s the opposite of what John Strand said here: Can we all agree that pre-recorded Conference talks are horrible? I mean… Why?
We’re back from our summer break as we ask how did a cryptomining campaign stay unspotted for years, quiz special guest and infosec rockstar Mikko Hyppönen about his book, and ponder what spiders teach us about misinformation.
begging questions about which infosec-related matters are particularly important, and how they stack up in relation to other business priorities, issues, pressures etc. In addition to the technical and human aspects of infosec, there are broader governance, strategic and commercial implications of [information] risk management and assurance.
Siegel and Mark Sweeney Publisher: Auerbach/CRC Press ISBN: 978-0-367-45817-1 Price: ~ US$100 + shipping from Amazon Outline This book lays out a systematic process for developing corporate strategy in the area of cyber (meaning IT) security and resilience. The book makes it a little easier. This stuff is hard.
OSINT Using Your Phone’s Address Book’ appeared first on Security Boulevard. Our sincere thanks to Security BSides Athens for publishing their Presenter’s Security BSides Athens 2022 Conference content on the organization’s’ YouTube channel.
Companies Prioritise Downplaying Severity and Covering Their Arses During one disclosure, I had the good fortune of a very close friend of mine working for the company involved in an infosec capacity. They were clearly stalling, being well over a week from my disclosure yet no public statements or notices to impacted individuals.
The post Episode 209: Fortinet’s Renee Tarun on Scaling InfoSec To Meet Tomorrow’s Challenges appeared first on The. Fixing InfoSec Demands Scale, Diversity. We also talk about her latest project: a children’s book to educate kids about basic cyber security concepts. . Read the whole entry. »
We could also have a massive network of technical support, using people in infosec who already have jobs. Being a member gets you access to the newsletter every week instead of just twice a month, access to the UL Slack Channel, the UL Book Club, the UL Archives, and access to future member-only content.
Recon Infosec is a growing managed security services provider run by a team of seasoned cybersecurity experts. All-star security team seeks a better solution Recon Infosec is not your average managed detection and response (MDR) provider. But for Recon Infosec, finding an alternative to its existing security stack was challenging.
As part of ChargePoint’s commitment to customer security, the company encourages researchers to collaborate with ChargePoint InfoSec to identify potential new vulnerabilities in its products or environment. For more information, please email the InfoSec team at: infosec@chargepoint.com.
Insurance claims from cyber/ransomware events have consumed up to 40% of the claims of some insurers’ cyber books. Have insurers and infosec professionals coordinate closely on security risk metrics. However, that landscape has faded fast – threatening the very availability of cyber insurance for ransomware.
The company has been honored by the Cybersecurity Breakthrough Awards, the Globee Information Technology Awards, TMCNet Zero Trust Security Excellence Awards, Cybersecurity Excellence Awards, Fortress Cybersecurity Awards, and the Global InfoSec Innovator award. Media contact: Shannon Cieciuch, Touchdown PR, traceable@touchdownpr.com
Building a strong incident response plan with play books and calibrating regularly via tabletop exercises with cross functional stakeholders is paramount. Traditionally, InfoSec lies within the IT organization, and Privacy is housed inside the Legal department. Business continuity plans can help mitigate disruptive incidents.
Booth babes and rampant sexism were more of a problem in infosec in the past. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. WANG : In leadership roles, I don't know that I think the overall percentage of women in cyber InfoSec is like 22%. So I learned.
However, we all know infosec/cyber/IT is awesome at intelligently assessing risk … right? Detecting timing analysis perhaps calls for further study (and reminds me of this book ) So, thoughts? :-) Thanks to Brandon Levene for his super insightful comments! Related posts: “Can We Have “Detection as Code”?”
We then compiled their answers into an e-Book, Lifting Each Other Up: A Celebration of Women in Cybersecurity and Their Advocates. . This resource illuminates how some of today’s leading infosec women experts got started in the cybersecurity industry and embraced the common goal of creating a more secure world for everyone.
Verizon’s Breach Report is one of the best infosec reports out there, and I’m always excited when I hear it’s been released. He looks at the key findings and talks about what they might mean to us going forward. The newsletter serves as the show notes for the podcast. The Dataviz Game on Point.
If you’re new to the information security field, or are looking to take your first steps towards a new career in InfoSec, the KLCP is a “must have” foundational certification. New Book - Kali Linux Revealed Mastering the Penetration Testing Distribution More exciting news!
The post DEF CON 29 Main Stage – Slava Makkaveev’s ‘I Know How To Take Over Your Kindle With An E-Book’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEFCON Conference Main Stage Videos on the groups' YouTube channel.
In this episode learn all about the world of corporate spying from someone who was a corporate spy and actually wrote a book on it! Robert Kerbeck author of “RUSE: Lying the American Dream from Hollywood to Wall Street” joins us to discuss his fascinating career as a corporate spy, life as a struggling actor, […].
RSA has been action-packed, meeting with customers, showing off our new product enhancements, and booking time with new prospects. On Monday we picked up our trophy for winning ‘Hot Company’ in API security in the Global InfoSec Awards. What a week we’re having – and it’s only Thursday! But that’s not all!
I'm currently enjoying another book by one of my favourite tech authors: Yossi Sheffi's The Resilient Enterprise *. Even at full price, this book is a bargain, well worth t: now it's a steal! Just a brief note today: it's a lovely sunny Saturday morning down here and I have Things To Do. Grab it while it's hot!
It's been resoundingly well-received by both browsers to the site and the sponsors themselves and I've already booked 2019 out until August. Who knows, maybe this is something I'll even write more about in 2019 if there's an appetite. The sponsorship model continued strongly too. Speaking Geez, where to start.
I’m not originally from the InfoSec world. I would love to recommend a slew of books to give you a wealth of acting knowledge, but the only book that ever gave me a palpable bump in my craft is Impro by Keith Johnstone the “Father of Improv.” Acting Skills and Training.
He recognized my passion for infosec (it wasn’t called cyber back then) and provided me with the support needed to make my ideas and projects a reality. Thanks to him I was able to co-found one of the first infosec consulting businesses in Spain in 2000, and I’m still very grateful for that opportunity. Great book by the way!).
As such, when you think about everything, be it basic security hygiene, information risk management, or even behavioral infosec, you must first consider how it fits with org culture. Behavioral InfoSec. Instead, be aware that your basics come first (out of necessity), then comes some form of risk mgmt.,
So, this is a blog post about a book about blog posts. It all began when Rob Conery reached out a few years ago and said "dude, we should totally turn a bunch of your blog posts into a book" to which I replied, "why?" I mean they're all up on my blog anyway, why on earth would anyone want to read them just stuffed into a book?
The states of Nevada, Minnesota and Washington stand out for having their own laws on the books creating liability in certain situations for businesses that handle credit card transactions and are not in compliance with PCI-DSS. States also differ on other data privacy and IT security compliance laws.
In this blog, and ahead of my talk at Infosec this week , I’m delving into this, and giving you tips for recognising its signs and preventing it as a leader. Although I was ahead of the times then, I believe leaders now must prioritise the mental health and wellbeing of themselves and their teams. It poses a threat in numerous ways.
Sometimes you don’t even need this level complexity as people often provide their full name and email (and other details) when booking tickets for example. He has been a speaker on the infosec circuit and was one of the keynotes at the inaugural 44CON London security event in 2011. Did you read those terms and conditions carefully?
Twitter infosec is the top 10%, at best, arguing with each other. I had a crazy idea this morning that I don't actually believe, but thought would be a great book idea. And therefore knowing how your stimuli will affect outcomes. What do you think the stat is for those without CIOs? Probably also zero. Don’t want to patch?
Bonus: 500 attendees will receive a copy of the book Aaron co-authored with Kelly Shortridge. Jasmine is an application security engineer, blogger, author, adjunct professor at Drexel, and 2020 Infosec Hall of Fame inductee. Aaron’s LinkedIn photo illustrates chaos engineering in action. Abhishek Arya, Google?—? you guessed it?—?open
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content