This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »
Dan Meacham is chief information security officer and CSO with Legendary Entertainment, the production company behind Godzilla vs. Kong and other popular films such as The Dark Knight and Jurassic World. The post CSO of the Year | Dan Meacham helps Legendary Entertainment’s movie magic live safely in the cloud appeared first on SC Media.
They targeted a technology they needed and then set out to acquire the technology. On the surface, the case of Racho Jordanov, CEO of JHL Biotech (Eden Biologics), and COO Rose Lin seemed like another case of corporate espionage. For many years they were successfully stealing Genentech’s secrets.
With rapidly evolving threats and increased business risk, security leaders are constantly pressed by the question: Do we have the right technology, people, and processes in place to protect the organization? For more of Goldsworthy’s insights, watch the full video of the event session embedded below.
HITECH stands for Health Information Technology for Economic and Clinical Health. The HITECH Act is a law that aims to expand the use of electronic health records (EHRs) in the United States.
At CSO’s recent InfoSec Summit, Lazar shared his research into what companies that are successfully implementing emerging collaboration technologies are doing to ensure that they are secure. What follows are edited excerpts of that presentation.
With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. John Bruggeman is chief technology officer at Hebrew Union College – Jewish Institute of Religion.
In 2022, we will see 5G go from new technology to a business enabler bringing previously unimaginable use cases because of its high bandwidth and lower latency. Data from the current AT&T Cybersecurity Insights Report shows that 5G technology is being driven by the line of business and has been siloed between IT and OT organizations.
Keeping skills and knowledge up to date with the latest trends is even more critical for CISOs as they are charged with deciding how the entirety of any company’s varied infosec resources will be deployed now and in the future.”. “It is vital to remain current with what is happening in the industry. Pick up the soft skills.
Booth babes and rampant sexism were more of a problem in infosec in the past. She’s an amazing person who has done an amazing number of things in a short amount of time -- CMU professor, Forrester analyst, CSO at a successful startup -- and she’s not done changing the industry. That is, until Chenxi Wang spoke up.
It was fitting that the opening keynote panel for SecureWorld Chicago on June 8th was titled " Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec Landscape.
We covered the new rules on July 31, with some thoughts from InfoSec leaders. Invest in Cybersecurity Tools and Training: Implement robust cybersecurity tools and technologies, and provide ongoing training to your employees on cybersecurity best practices. Immediately or not, Dec. 15 is now here, and the new rules will be in effect.
Today, modern technology has made it much easier for hackers and other cybercriminals to hide their tracks. He has been featured on major media outlets including TheGuardian, Lifehacker Australia, The Next Web, CSO, ITProPortal, Infosec Magazine, Tripwire and many others.
Jeff Moss, ICANN CSO and founder of DEF CON/Black Hat, gave the keynote speech at SecTor 2021 in Toronto, Ontario. Moss also said that all hacking is not infosec and that all infosec is not hacking. Where with infosec the goal is to produce income. His talk was nostalgic, reflecting on the 40+ years of computer hacking.
Former Uber CSO Joe Sullivan was found guilty of obstructing a federal investigation in connection with the attempted cover-up of a 2016 hack at Uber, NIST and Microsoft say that mandatory password expiration is no longer needed but many organizations are still doing it, and how fake executive profiles are becoming a huge problem for […].
It also cites the emergence of recent technologies, and the proliferation of criminal groups, as issues increasing pressure on staff. Given the evolving nature of the threat landscape, keeping up with newer security technologies and best practices can also be mentally exhausting.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. I've mentioned before but InfoSec Twitter is a valuable resource. For many, though, that isn’t true.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. I've mentioned before but InfoSec Twitter is a valuable resource. For many, though, that isn’t true.
Josh Feinblum is the co-founder of Stavvy, a Boston-based fully integrated digital mortgage platform, where he leads product, engineering, people, and finance. He also serves as a venture partner at F-Prime Capital, where he evaluates and advises startups of all stages across multiple verticals.
Brian Krebs is an independent investigative reporter known for his coverage of technology, malware , data breaches , and cybercrime developments. Longtime network and system administrator Jack Daniel is a technology community activist, mentor, and storyteller. Markstedter actively contributes to filling the infosec education gap.
Former Facebook CSO Alex Stamos, who was brought in to help Zoom navigate privacy and security issues, then began a long thread of tweets to do what the company considers setting the record straight. This raised the question of whether Zoom might allow law enforcement into meetings or share meetings of its free level users with police.
What else do we know about DeRusha's InfoSec background? After his stint at Ford Motor, DeRusha became the Chief Security Officer (CSO) for the State of Michigan. SecureWorld reached out to Michigan's first CISO and CSO, Dan Lohrmann, for reaction to Chris DeRusha's appointment as Federal CISO.
The opening keynote for InfoSec World 2021 will feature Roland Cloutier, chief security officer of TikTok, who will share specific strategies to gain and maintain consumer trust – particularly following security issues and political turmoil. Prior to ADP, he was CSO at data storage vendor EMC (now owned by Dell).
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content