This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
We’re living in a different world in which no business or government is isolated from these threats. That’s why CSO’s Future of InfoSec Summit is a must-attend event. Contracting firms that have access to crypto currency and know how to negotiate with ransomware attackers.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »
government is urging software makers to adopt secure application-development practices that help prevent buffer overflow attacks. Cybersecurity News) How to mitigate buffer overflow vulnerabilities (Infosec Institute) How to prevent buffer overflow attacks (TechTarget) VIDEOS What is a Buffer Overflow Attack? This week, the U.S.
He details the war aims of Russia, including destroying the Ukrainian government, society, population, and the country as a whole. His closing keynote provides eye-opening details about the cyber war between Ukraine and Russia now that it's eight months in. And 9 more informative sessions.
We covered the new rules on July 31, with some thoughts from InfoSec leaders. Public companies will also have to share details about their "cybersecurity risk management, strategy, and governance" on an annual basis. What should companies do to prepare?
Remesh Ramachandran, a security researcher and consultant for the government, spells it out in a Medium post. CGEIT: Certified in the Governance of Enterprise IT. People will ignore what you say when you’re only speaking technical,” James Stanger, chief technology evangelist at CompTIA, told CSO Online. Get the degree.
Booth babes and rampant sexism were more of a problem in infosec in the past. She’s an amazing person who has done an amazing number of things in a short amount of time -- CMU professor, Forrester analyst, CSO at a successful startup -- and she’s not done changing the industry. That is, until Chenxi Wang spoke up.
With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. In government, Brooks served under President George W.
Jeff Moss, ICANN CSO and founder of DEF CON/Black Hat, gave the keynote speech at SecTor 2021 in Toronto, Ontario. Moss also said that all hacking is not infosec and that all infosec is not hacking. Where with infosec the goal is to produce income. His talk was nostalgic, reflecting on the 40+ years of computer hacking.
Former Facebook CSO Alex Stamos, who was brought in to help Zoom navigate privacy and security issues, then began a long thread of tweets to do what the company considers setting the record straight. I've got friends in the government who tell me, oh, it is all over. Clearly, Zoom's wild ride continues. He has a very strong response.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. For many, though, that isn’t true. In a moment we'll meet a woman who has four graduate degrees in it, plus an MBA.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. For many, though, that isn’t true. In a moment we'll meet a woman who has four graduate degrees in it, plus an MBA.
How to screen for natural infosec talent: Ask for a worst case scenario for any common situation. Street is an industry-respected speaker and analyst and currently is the VP of InfoSec for SphereNY. Markstedter actively contributes to filling the infosec education gap. — Jack Daniel (@jack_daniel) October 10, 2018.
The federal government has awakened to the urgency of cybersecurity and responded with new agencies, appointments, and appropriations. It grew out of military intelligence capability forged during WWII to handle signals intelligence (SIGINT) and information security (INFOSEC). To read this article in full, please click here
DeRusha recently updated his LinkedIn profile to his new role: CISO of the United States Government. Mainly, his role will be to guide cybersecurity policy, planning, and implementation across all government agencies. What else do we know about DeRusha's InfoSec background? I am confident that he will help improve coordination.
The opening keynote for InfoSec World 2021 will feature Roland Cloutier, chief security officer of TikTok, who will share specific strategies to gain and maintain consumer trust – particularly following security issues and political turmoil. Prior to ADP, he was CSO at data storage vendor EMC (now owned by Dell).
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content