Remove Encryption Remove InfoSec Remove Technology
article thumbnail

Inside the DemandScience by Pure Incubation Data Breach

Troy Hunt

For example, mine was just one of many tens of thousands of Pfizer email addresses, and that sort of thing is going to raise the ire of some folks in corporate infosec capacities.

article thumbnail

Thinking About the Future of InfoSec (v2022)

Daniel Miessler

The ideas will cover multiple aspects of InfoSec, from organizational structure to technology. Technology. At the highest level, I think the big change to InfoSec will be a loss of magic compared to now. Technology. HT to Jeremiah Grossman to also being very early to seeing the role of insurance in InfoSec.

InfoSec 180
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

The report explores major findings and this year it put a spotlight on the complexity of the cybersecurity landscape, which is intensified by geopolitical tensions, emerging technologies, supply chain interdependencies, and cybercrime sophistication. Nation-states and geopolitical tensions are increasingly fuelling modern cyber threats.

article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

At the same time, we also have changes at every layer of the protocol stack and this is driven by an increased push for encryption—not just encryption, strong encryption.". We're responsible for the CIS benchmarks and the CIS controls.

InfoSec 97
article thumbnail

The CPRA: What You Should Know as an InfoSec Professional

SecureWorld News

Endpoint encryption for all laptops. Deploy technologies and tools that help you scale data management in a manageable way. Describing the dual-enforcement aspect of the CPRA and CCPA, with the California Attorney General and California Consumer Protection Agency having oversight and enforcement power. Privacy training, specifically.

InfoSec 98
article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

We constantly see new threats, and threat vectors, come and go; which puts a tremendous strain on the InfoSec teams that have to protect organizations and businesses from these threats. With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize.

article thumbnail

Kingston Technology Wins Coveted Global InfoSec Awards During RSA Conference 2021

CyberSecurity Insiders

the flash memory affiliate of Kingston Technology Company, Inc., Encryption Market Leader. Kingston’s encrypted drives are an important tool for the government and military, as well as organizations that adhere to strict regulations, including FIPS, HIPAA, Sarbanes-Oxley, GDPR and CCPA. “We About CDM InfoSec Awards.

InfoSec 40