Remove Digital transformation Remove Information Security Remove InfoSec
article thumbnail

BSides Perth 2021 – Bex Nitert & ‘Digital Transformation Of The Illicit Economy’

Security Boulevard

The post BSides Perth 2021 – Bex Nitert & ‘Digital Transformation Of The Illicit Economy’ appeared first on Security Boulevard. Many thanks to BSides Perth for publishing their tremendous videos from the BSides Perth 2021 Conference on the organization’s YouTube channel.

article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

Kathleen Moriarty's opening line for her presentations at two upcoming SecureWorld virtual conferences tee up nicely the deep insights she will provide: "T he topic of transforming information security is a big one, but we are at a unique period of time for security," said Moriarty, Chief Technology Officer at the Center for Internet Security, based (..)

InfoSec 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Risks to Your Network from Insecure Code Signing Processes

Security Boulevard

Many InfoSec teams don’t have the visibility into what their software development teams are doing. In addition, code signing often plays second-fiddle to other information security issues and isn’t viewed as a high priority. However, InfoSec teams need to understand that significant risks exist around poor code signing hygiene.

Risk 98
article thumbnail

BSides Tallinn’s ‘Best Of BSides 2021’: BSides Perth 2021 – Bex Nitert’s ‘Digital Transformation of the Illicit Economy and Outsourced Crime Providers’

Security Boulevard

The post BSides Tallinn’s ‘Best Of BSides 2021’: BSides Perth 2021 – Bex Nitert’s ‘Digital Transformation of the Illicit Economy and Outsourced Crime Providers’ appeared first on Security Boulevard.

article thumbnail

CyberSaint STRONGER 2022 Conference Call for Speakers is Open!

CyberSecurity Insiders

The virtual conference is free to attend and will span three days including multiple tracks: Frameworks, Security, & Risk, Transforming the C-Suite, and InfoSec 360. Conference Tracks: Frameworks, Security, & Risk. Transforming the C-Suite. InfoSec 360.

article thumbnail

Researchers analyzed a new JavaScript skimmer used by Magecart threat actors

Security Affairs

com #magecart #infosec #cybersecurity #malware [link] pic.twitter.com/x8VrkKzXPc — Luke Leal (@rootprivilege) August 26, 2022. “Online shopping activity is constantly on the rise due to its ease of use, digital transformation, and the sheer convenience. ” concludes the report.

article thumbnail

Spotlight Podcast: RSA CTO Zulfikar Ramzan on confronting Digital Transformation’s Dark Side

The Security Ledger

In this Spotlight Edition of the podcast we're speaking with RSA Chief Technology Officer Zulfikar Ramzan about how his company is adapting to help its customers confront the dark side of digital transformation initiatives: increased digital risk, including from cloud, artificial intelligence and the Internet of Things.