Remove CISO Remove Energy and Utilities Remove Technology
article thumbnail

GUEST ESSAY: Here’s why castle-wall defenses utterly fail at stopping deceptive adversaries

The Last Watchdog

There are several methods of active defense that companies can utilize to safeguard their networks, and it’s time for CISOs to start picking. He previously managed development teams at Check Point Software Technologies and was a research assistant in the Atom Chip Lab focusing on theoretical Quantum Mechanics.

article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. An integration with Cigent Technology is now available for Secure Endpoint customers to integrate with. Kenna has a healthy 3rd Party ecosystem of technology partners.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Halliburton Confirms Network Disruption After Suspected Cyber Attack

SecureWorld News

The incident has raised concerns within the energy sector, as Halliburton plays a crucial role in global oilfield operations, and any disruption to its networks could have far-reaching implications. The potential cyberattack on Halliburton underscores the growing threat to critical infrastructure and companies within the energy sector.

article thumbnail

2022 Cybersecurity predictions

CyberSecurity Insiders

In 2022, we will see 5G go from new technology to a business enabler bringing previously unimaginable use cases because of its high bandwidth and lower latency. Data from the current AT&T Cybersecurity Insights Report shows that 5G technology is being driven by the line of business and has been siloed between IT and OT organizations.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. Todd Bell serves as the chief information security officer and executive director at Valleywise Health.

article thumbnail

Spotlight on Cybersecurity Leaders: Ryan Mostiller

SecureWorld News

I was fortunate enough to have connected with the previous CISO at the org, and he recruited me into the role. A : You never get bored with the ever-changing risks, problems, or new technology to learn about! Ryan will be moderating the Advisory Council Roundtable Lunch on the topic of The Surprising List of CISO Top Concerns.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

5G technology will improve some IoT use cases, thereby adding to the proliferation of IoT devices – a phenomena individuals and organizations aren’t prepared to fully defend in the immediate future. Untrusted proprietary technologies that fail to meet these standards pose lingering threats to their clients and inefficiencies.

Risk 137