Remove Information Security Remove InfoSec Remove Webinar
article thumbnail

BSides Berlin 2021 – Michal Ogorzalek’s ‘How Secure Are Webinar Platforms?’

Security Boulevard

The post BSides Berlin 2021 – Michal Ogorzalek’s ‘How Secure Are Webinar Platforms?’ ’ appeared first on Security Boulevard. Our thanks to BSides Berlin for publishing their tremendous videos from the BSides Berlin 2021 Conference on the organization’s’ YouTube channel.

article thumbnail

Empowering Women in Cybersecurity: Insights from ISC2's Latest Study

SecureWorld News

We have been identifying people based on personality and aptitude for decades," said Rick Doten , VP, Information Security, Centene Corporation, who just keynoted on the topic of neurodiversity at SecureWorld Charlotte on April 2nd. " My initial thought is 'how is this new?' On social media, I didn't have to 'work the room.'

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Defense Magazine – September 2020 has arrived. Enjoy it!

Security Affairs

We hope you enjoy this month’s edition…packed with over 150 pages of excellent content. 150 Pages Loaded with excellent content Learn from the experts, cybersecurity best practices Find out about upcoming information security related conferences, expos and trade shows. Always free, no strings attached.

InfoSec 109
article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

In other words, it’s not just about implementing MFA to verify user trust, it’s about using phishing-resistant MFA with risk-based authentication , device posture checks and other security controls. TL,DR: Check out our on-demand webinar Your Zero Trust Roadmap , where we outline the five key steps to secure user access to apps.

article thumbnail

The Best Way to Start Your Cloud Security Career

CyberSecurity Insiders

Where do you begin your journey in InfoSec? These questions often haunt a new InfoSec candidate, sometimes causing them to freeze, doing nothing for fear of taking the wrong path. Everywhere you look, it is apparent that cloud computing is not only the future of Information Security, it is happening right now.

InfoSec 85
article thumbnail

Resecurity Named Winner of the Coveted Global InfoSec Awards During RSA Conference 2021

CyberSecurity Insiders

SAN FRANCISCO–( BUSINESS WIRE )–Resecurity is proud to announce they have won the following award(s) from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine: Cutting Edge in Digital Footprint Security. Join a webinar at [link] and realize that infosec knowledge is power.

InfoSec 52
article thumbnail

Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat

Security Boulevard

CISA and the FBI also highlighted these buffer overflow vulnerabilities: CVE-2025-21333 CVE-2025-0282 CVE-2024-49138 CVE-2024-38812 CVE-2023-6549 CVE-2022-0185 For more information about buffer overflow attacks and vulnerabilities: Buffer Overflow (OWASP) What is Buffer Overflow? Check out how they responded.

Banking 64