Remove Data Analyst Remove Encryption Remove Information Security
article thumbnail

Thinking About the Future of InfoSec (v2022)

Daniel Miessler

I’m starting a new series with this 2022 edition where I think about what Information Security could or should look like in the distant future—say in 2050. This smaller security team will be responsible for analyzing data from the various telemetry sources and ensuring that everything is within tolerance.

InfoSec 180
article thumbnail

Mental Health Apps are Likely Collecting and Sharing Your Data

Security Boulevard

Entities include healthcare providers, health plans, health clearing houses, and business associates (such as billing specialists or data analysts). Even apps that collect PHI information protected by HIPAA may still share/use your information that doesn't fall under HIPAA protections. and actively used/shared.

article thumbnail

Indicators of compromise (IOCs): how we collect and use them

SecureList

Usually after the phrase there are MD5 hashes [1] , IP addresses and other technical data that should help information security specialists to counter a specific threat. This is the most precious source of intelligence as it provides unique and reliable data from trusted systems and technologies.