This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
I’m starting a new series with this 2022 edition where I think about what InformationSecurity could or should look like in the distant future—say in 2050. The ideas will cover multiple aspects of InfoSec, from organizational structure to technology. Org Structure. Technology. Regulation. Automation / AI.
Last week, I attended an excellent briefing given by Tom Gillis, Senior Vice President and General Manager of VMware’s Networking and Advanced Security Business Group, in which he discussed various important cybersecurity-related trends that he and his team have observed.
Don't miss Kathleen Moriarty's complete presentation, as well as those of other cybersecurity leaders, at our upcoming digital events. Attendance is free and can earn 5 CPE credits. See more and register at the links below: Texas virtual conference on Thursday, Nov. West Coast virtual conference on Thursday, Dec.
They discuss the challenges within the cybersecurity industry, including the transition to cloud computing and the neglect […] The post Alyssa Miller: Charting the Course Through InfoSec and Aviation appeared first on Shared Security Podcast.
Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. For sanity, manage to a written informationsecurity policy.
I'm intrigued by the title of this topic-specific policy from the [draft] 3rd edition of ISO/IEC 27002 , being the only one of eleven example titles in the standard that explicitly states "informationsecurity". Organisations deal with events and incidents all the time. I ask myself why? Here's one I prepared earlier.
As an informationsecurity professional, have you often found yourself frustrated by the growing collection of cyber-based rules, guidance, regulations, and contemplations that our lawmakers can conjure up? It is also clear that informationsecurity professionals see things differently than most non-security people.
begging questions about which infosec-related matters are particularly important, and how they stack up in relation to other business priorities, issues, pressures etc. begging questions about which infosec-related matters are particularly important, and how they stack up in relation to other business priorities, issues, pressures etc.
Discussing environmental and social issues in infosec with ESG researcher Chloé Messdaghi. Today, I sit down with Chloé to discuss the biggest issues facing the infosec industry, such as diversity and sustainability, and how we can start tackling them together. What are the biggest social challenges facing our industry?
I see this sentiment a lot from a lot of people in infosec, and I think I’ve figured it out. I think a massive amount of the infosec conference scene is people in Live Music Mode. But I enjoy that most in LobbyCon, and the dinners, and the events we do together away from the conference—not so much in the talk itself.
Many thanks to BSides Huntsville 2021 for publishing their tremendous conference videos on the organization's YouTube channel; one of the best BSides for this year, don't miss this 10-video infosecevent. The post BSides Huntsville 2021 – David Hunt’s ‘Hack In Your Sleep’ appeared first on Security Boulevard.
Security experts who reviewed the leaked data say they believe the information is legitimate, and that i-SOON works closely with China’s Ministry of State Security and the military. In 2021, the Sichuan provincial government named i-SOON as one of “the top 30 informationsecurity companies.”
This is the biggest INFOSEC show on earth and we will be there! It’s our 10th anniversary in business and at @RSAConference #RSAC: Where the world talks #security There is No better INFOSECevent on Earth. Thank you all and to our readers! OSINT ROCKS! link] We have a growing team working for YOU at no-charge.
First, in the nearly ten years since Andrew Stewart and I wrote The New School of InformationSecurity, and called for more learning from breaches, we've seen a dramatic shift in how people talk about breaches. Second, last year marked 25 years of calls for an "NTSB for infosec."
Hackers could trigger ‘fake earthquakes,’ affecting emergency and economic responses to a seismic event, and generate mistrust in seismic technology among the population, the researchers say. Seismic monitoring equipment is vulnerable to common cybersecurity threats like those faced by IoT devices, a new research paper warns.
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. Chris Spohr is the InformationSecurity Officer for Republic Finance, LLC, and adds value by serving as the Head of InformationSecurity to protect the company's data, brand, and jobs.
Since 2007 the InfoSec industry has been talking about TheBigOne™—the event that would change cyber threats from annoyances to existential concerns. They called it Cyber Pearl Harbor. This doesn’t mean it can’t still happen.
These skills also happen to apply to informationsecurity (infosec) and cyber threat intelligence and research. And you'll leave your first infosec conference with an armful of them. But infosec is the rare industry with clearcut heroes and villains. My Infosec Era has only just begun. I didn't do it alone.
Many thanks to BSides Huntsville 2021 for publishing their tremendous conference videos on the organization's YouTube channel; a great BSides, don't miss this 10-video infosecevent. The post BSides Huntsville 2021 – Melissa Benua’s ‘Fuzz Testing For Fun And Profit’ appeared first on Security Boulevard.
Many thanks to BSides Huntsville 2021 for publishing their tremendous conference videos on the organization's YouTube channel; one of the best BSides for this year, don't miss this 10-video infosecevent.
A security researcher disclosed details of four zero-day flaws impacting an IBM security product after the IT giant refused to address them. IDRM handles very sensitive information, for this reason the exploitation of any issue affecting the product could have important consequences. and that one is certainly vulnerable.”
Throughout the media you have people substituting their in-person events with virtual ones, and they all seem to be using Zoom. The most important thing we can do as security professionals is to keep our risk evaluations in context with what we’re protecting. It was extraordinary.
The net result will be less employment opportunities and eventually less job-hoping in 2023 despite the talent shortfall in IT security. Chief InformationSecurity Officers (CISOs) have a rare combination of business acumen, operational knowledge, technical insights, and legal/compliance experience. CISO shortage. CISO exodus.
Many thanks to BSides Huntsville 2021 for publishing their tremendous conference videos on the organization's YouTube channel; a great BSides, don't miss this 10-video infosecevent. The post BSides Huntsville 2021 – Steven Kirby’s ‘Requiem For The Password’ appeared first on Security Boulevard.
For example, outcomes like adapting to external events, creating a security culture, and cost-effective programs, all improve when organizations make progress towards zero trust security (based on survey responses from 4,751 active informationsecurity and privacy professionals from 26 countries).
The 2023 event saw a 33 percent increase in Conference Pass attendees over the 2022 event. The next opportunity to catch a SecureWorld event is SecureWorld Boston , taking place at the Hynes Convention Center on March 22-23. And two vendor panels: There's a Bad Moon On the Rise – Are You Ready?
Kathleen shares her extensive experience in the field, recounting her tenure in various cybersecurity events and her contributions to job market research and recruiting. In this episode we welcome Kathleen Smith, CMO of ClearedJobs.net, to discuss the current state of the cybersecurity job market.
Many thanks to BSides Huntsville 2021 for publishing their tremendous conference videos on the organization's YouTube channel; a great BSides, don't miss this 10-video infosecevent.
Many thanks to BSides Huntsville 2021 for publishing their tremendous conference videos on the organization's YouTube channel; a great BSides, don't miss this 10-video infosecevent.
Many thanks to BSides Huntsville 2021 for publishing their tremendous conference videos on the organization's YouTube channel; one of the best BSides for this year, don't miss this 10-video infosecevent.
The theme is often breaking into infosec. I get to dust off some oldies and give a snapshot of security research circa [insert year of choice here]. Schools and universities really get a lot from these events. Every year, I take part in talks for universities and schools. It’s a win-win for everybody. Closing thoughts.
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. Bill Bowman, CISSP, CIPM, is the Chief InformationSecurity Officer & Data Privacy Officer at financial software company Emburse. I learned from them.
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. He has been working in cybersecurity for the last 20 years and teaching the next generation of InfoSec pros. Bryan Bechard is CISO for Flagship Credit Acceptance.
Leighton has some real admiration for the Ukraine government and the host of supporters across the world—including 200,000 InfoSec practitioners aiding in Ukraine's cyber efforts—for not just battling Russia, but winning in many instances. To watch the full presentation, check out the event's agenda and register today.
The concept of a Security Data Lake, a type of Data Lake explicitly designed for informationsecurity, has not received much attention yet. It can potentially bring a company's security to the next level. However, this is not your ordinary data storage solution. The same thing happens when connecting to a Wi-Fi router.
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. He is the Chief InformationSecurity Officer at Veterans United Home Loans in Columbia, Missouri. Randy is a CISSP and is active in the Central Missouri InfoSec community.
It was fitting that the opening keynote panel for SecureWorld Chicago on June 8th was titled " Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec Landscape. Well, informationsecurity, cybersecurity happens to be a critical part of the business, being able to achieve strategic objectives. "You
Verizon’s Breach Report is one of the best infosec reports out there, and I’m always excited when I hear it’s been released. A securityevent that compromises the integrity, confidentiality or availability of an information asset. Errors were causal events in 22% of breaches. Top tactics utilized.
This nonstop barrage of security crises has made certain infosec leaders and practitioners more aware than ever of the job’s impact on mental healthy, and the importance to protect against stress, exhaustion and burnout. But how have they been managing? Florence Mottay, Ahold Delhaize.
The iPhone exploit, known as Operation Triangulation, has complex chains of events that lead to compromised iPhone security. Meanwhile, the lawsuit against Google claims […] The post Most Advanced iPhone Exploit Ever, Google’s $5 Billion Settlement, Apple’s Journal App appeared first on Shared Security Podcast.
Today we announced that Salt has won “Hot Company” in the API security category in the Cyber Defense Magazine (CDM) 2023 Global InfoSec Awards. The CDM Global InfoSec Awards honor informationsecurity innovators who provide unique and compelling products and services.
Firewalls monitor and report suspicious attacks, with the support of a 'SecurityInformation and Event Management' (SIEM) tool, the business is able to detect and quickly respond to cyber-attacks, which is covered by PCI DSS requirement 10. PCI DSS requirement 6.6 Monitoring and Responding to Malicious Activity.
This triggers the event or flow of payment authentication and processing with various entities involved in the process. Author Bio Narendra Sahoo (PCI QSA, PCI QPA, CISSP, CISA, and CRISC) is the Founder and Director of VISTA InfoSec , a global InformationSecurity Consulting firm, based in the US, Singapore & India.
This is an industry still struggling with elevated anxiety levels following the events of the past eighteen months. Here are some more insights from people in the infosec community on what works for them: Advice on How Security Pros Can Promote Their Mental Health. Cybersecurity is a challenging and demanding industry.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content