This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »
Cybersecurity News) How to mitigate buffer overflow vulnerabilities (Infosec Institute) How to prevent buffer overflow attacks (TechTarget) VIDEOS What is a Buffer Overflow Attack?
Booth babes and rampant sexism were more of a problem in infosec in the past. She’s an amazing person who has done an amazing number of things in a short amount of time -- CMU professor, Forrester analyst, CSO at a successful startup -- and she’s not done changing the industry. That is, until Chenxi Wang spoke up.
Below is our esteemed panel of SC Awards judges, contributing from health care, engineering, finance, education, manufacturing, nonprofit and consulting, among others. Lambrou is workgroup chair for the Real Estate Standards Organization and executive committee member of the Institute of Electrical and Electronics Engineers.
UP: Zoom gave users meeting routing controls, announced a 90-day plan to boost cybersecurity, quickly updated features so meeting hosts could reduce the risk of Zoom-bombing, and re-deployed all engineers to work on privacy and security features. Clearly, Zoom's wild ride continues. Have remote work tools like Zoom killed our privacy?
Jeff Moss, ICANN CSO and founder of DEF CON/Black Hat, gave the keynote speech at SecTor 2021 in Toronto, Ontario. Moss also said that all hacking is not infosec and that all infosec is not hacking. Where with infosec the goal is to produce income. His talk was nostalgic, reflecting on the 40+ years of computer hacking.
Higher up, engineers are perpetually tuning those products, while implementing other products in an, often tactical, game of whack-a-mole. At the CISO level, politics and limited budget often prevent proper risk reduction, with the CISO standing alone to shoulder the blame for a breach. "The
Josh Feinblum is the co-founder of Stavvy, a Boston-based fully integrated digital mortgage platform, where he leads product, engineering, people, and finance. He also serves as a venture partner at F-Prime Capital, where he evaluates and advises startups of all stages across multiple verticals.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. Tennisha: I did my undergraduate at Carnegie Mellon University in electrical and computer engineering. For many, though, that isn’t true.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. Tennisha: I did my undergraduate at Carnegie Mellon University in electrical and computer engineering. For many, though, that isn’t true.
Russian software engineer Eugene Kaspersky’s frustration with the malware of the 80s and 90s led to the founding of antivirus and cybersecurity vendor Kaspersky Lab. How to screen for natural infosec talent: Ask for a worst case scenario for any common situation. Matthew Green is a renowned expert in cryptographic engineering.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content