This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Informationsecurity is an exciting and rapidly growing field for individuals who are interested in protecting users and their data. In an effort to map out the industry as a possible career choice, we recently conducted research into the top 10 infosec jobs based on overall pay grade. 5: […]… Read More. . #5:
Informationsecurity (InfoSec) risk management with third parties, including outsourcing, requires persistence and consistency due to the primary business risk it presents. Third-party managers need to have insights into a variety of areas of informationsecurity, including.
I have attended numerous security conferences over the past several years, and at each one, I repeatedly hear about the importance of informationsecurity being incorporated within the planning and requirement analysis phase of the software development life cycle (SDLC). I agree – this is very important.
This week, Chloé helps a newbie explore the world of InfoSec. The post Ask Chloé: Where to Begin In InfoSec appeared first on Security Boulevard. Each week, Chloé provides advice to readers’ questions to help guide them as they navigate the technology industry. What are the first.
The focus of the boot camp was around "behavior design," which was suggested to me by a friend who's a leading expert in modern, progress securityawareness program management. I concluded that maybe this sub-field would be called something like "behavioral security" and started doing searches on the topic.
Using the Easy Button™ Last month, we posted our blog explaining the staffing shortage in the informationsecurity (InfoSec) industry. The post Fixing the Shortage of InformationSecurity Professionals appeared first on Security Boulevard. It can often take three to six months to fill.
Building a securityawareness training program to develop a strong infosec culture requires time and money, and chief informationsecurity officers frequently try to make a case for such an investment by citing return on investment and other metrics of success. .” Christiaan Colen / CC BY-SA 2.0 ).
SAN ANTONIO–( BUSINESS WIRE )–SecurityAwareness Training and Human Risk Management company AwareGO today announced company milestones achieved and overall performance for 2021, including record year-over-year online revenue growth of 219%, enterprise revenue growth of 156%, and total revenue growth of 116%.
This morning I've been studying the final draft of the forthcoming second edition of ISO/IEC 27014 "Governance of informationsecurity" , partly to update ISO27001security.com but mostly out of my fascination with the topic. This will support the delivery of security education, training and awareness programs.
Prior to Mastercard, Abdullah was the chief informationsecurity officer at Xerox, where she established and led a corporate-wide information risk management program. She also served as the deputy chief information officer of the White House. She is also the host of the Mastering Cyber podcast.
This morning, I’ve been browsing and thinking about ISO/IEC 27403 , a draft ISO27k standard on the infosec and privacy aspects of “domotics” i.e. IoT things at home. Security configuration is, at best, an ad hoc activity when (some) things turn up. Security monitoring and management (e.g.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Dmitriy Sokolovskiy has been working in the cybersecurity space for over 14 years in dedicated security roles, in addition to 9 more years working in various IT areas.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. She held Audit and Security leadership roles in leading European companies. In 2014 she founded WITSEC, a professional group of women working in IT and InformationSecurity […].
Some time back I bumped into a handy management guide on information risk - a double-sided leaflet from the I nformation A ssurance A dvisory C ouncil. Sound advice like this is valuable both as it stands, and as a basis to develop awareness materials, strategies, policies and procedures.
This is bewildering, scary stuff, especially for relatively inexperienced infosec or cybersecurity professionals who seldom set foot outside of the IT domain. At the CISO, InformationSecurity Manager or Privacy Officer level, the view is no less scary despite narrower knowledge gaps. Documented! Maintained!
In this episode, Tom shows off AI generated images of a “Lonely and Sad SecurityAwareness Manager in a Dog Pound” and the humorous outcomes. The conversation shifts to Apple’s upcoming support for Rich Communication Services (RCS) and the potential security implications.
Oh no, it's more circumspect: the standard says "the organization shall determine the need for internal and external communications relevant to the informationsecurity management system". on securityawareness which is already in the plan anyway: maybe we should mention A.7.2.2 in the preamble though.
The post The Business Value of the Social-Engineer Phishing Service appeared first on Security Boulevard. Phishing attacks continue to plague organizations across the globe with great success, but why? Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an.
Award-winning security transformation manager and digital anthropologist Lianne Potter joins us to discuss the fascinating topic of digital anthropology and how we can rehumanize cybersecurity.
We cover how empathy relates to cybersecurity in the industry, the importance of being empathetic in our roles as […] The post Exploring the Role of Empathy in Cybersecurity with Andra Zaharia appeared first on The Shared Security Show.
Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides advice to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé answers questions about the use of the term ‘cyber’ and how to best start implementing diversity, equity and inclusion best practices.
In episode 327 Tom, Scott, and Kevin discuss the findings from Mandiant’s M-Trends 2024 report, highlighting a significant rise in traditional vulnerability exploitation by attackers while observing a decline in phishing. Despite phishing’s decreased prevalence, it remains the second most popular method for gaining initial network access.
Finally, we […] The post The FBI’s Qakbot Takedown, QR Code Phishing Attacks, Dox Anyone in America for $15 appeared first on Shared Security Podcast. In this episode we discuss the FBI’s remarkable takedown of the Qakbot botnet, a saga involving ransomware, cryptocurrency, and the FBI pushing an uninstaller to thousands of victim PCs.
In the milestone 350th episode of the Shared Security Podcast, the hosts reflect on 15 years of podcasting, and the podcast’s evolution from its beginnings in 2009. The ‘Aware Much’ segment focuses on […] The post Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits appeared first on Shared Security Podcast.
In this episode, noteworthy guest Tanya Janca returns to discuss her recent ventures and her vision for the future of Application Security. Tanya sheds light on her decision to partner […] The post Application Security Trends & Challenges with Tanya Janca appeared first on Shared Security Podcast.
The post Business Email Compromise Scams appeared first on The Shared Security Show. This month we discuss Business Email Compromise (BEC) scams. What are they, how to identify them, and why BEC scams have created over $1.8 link] 64 times worse than ransomware? FBI statistics underline the […].
Several major organizations, including British Airways and the BBC, fell victim to the recent MOVEit cyberattack. We discuss the alarming trend of hackers targeting trusted suppliers to gain access to customer data, potentially holding companies and individuals for ransom.
In this episode we speak with Kai Roer, a renowned author, security culture coach, and CEO of Praxis Security Labs. Kai shares his career journey in cybersecurity and emphasizes the importance of building a strong security culture within organizations.
The post Truths and Myths of Privacy, Fake Shopping Apps, Borat RAT Malware appeared first on The Shared Security Show. Scott and Tom explain why privacy isn’t dead, why should everyone should care about their privacy, and how you should respond to someone that says “I don’t care about privacy, I have nothing to hide!”.
The 'obvious' driver for informationsecurity is information risk: valuable yet vulnerable information must be secured/protected against anything that might compromise its confidentiality, integrity or availability, right? What does management want/expect out of informationsecurity?
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content