This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Each week, Chloé provides advice to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé helps a newbie explore the world of InfoSec. The post Ask Chloé: Where to Begin In InfoSec appeared first on Security Boulevard. What are the first.
Each week, Chloé provides advice to readers’ questions to help guide them as they navigate the technology industry. The post Ask Chloé: Hackers’ Rights and Women in Infosec appeared first on Security Boulevard. Dear Chloé, I came across your talk on hacker rights. Since watching.
Chief executive officers and chief technology officers know this is a potentially existential threat both for their companies and for them professionally. The post Reducing InfoSec Threats Takes a Village appeared first on Security Boulevard. In 2021 alone we’ve seen data breaches impact many Fortune 500 companies.
Despite their largely inherent familiarity with technology, employees aged 18-24 collectively performed the worst on the quiz, with only 16% passing. Users should approach any suspicious messages with extreme caution, or go straight to their IT and security teams to have them examine it first.”.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Dmitriy Sokolovskiy has been working in the cybersecurity space for over 14 years in dedicated security roles, in addition to 9 more years working in various IT areas.
NYSE: NABL), the purpose-built technology partner for managed services providers (MSPs), is celebrating strong growth of the Technology Alliance Program (TAP) throughout 2021, adding more than 25 partners this year, more than half of which are focused on security. DURHAM, N.C.–( –( BUSINESS WIRE )– N-able, Inc.
just banned all technology from Russia and China? Ban Chinese and Russian Technology? appeared first on Security Boulevard. So what should be done in cases like this? What if the U.S. Is it a good idea? Is it even possible? Ira Winkler joins the discussion - check it out. The post Malicious Life Podcast: Should the U.S.
In the spirit of National Cyber SecurityAwareness Month (NCSAM), my colleague Ashvin Kamaraju wrote about how organizations can use fundamental controls to secure their information technology. Effective digital security doesn’t end at “Secure IT,” however. Building a Robust Security Culture.
Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides answers to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé offers advice to an InfoSec pro struggling with response time anxiety.
Brian Levine is senior director of product security at Axway, a global security engineering organization delivering training, tools, processes and DevSecOps practices for secure applications and cloud services to the enterprise market. In government, Brooks served under President George W.
Each week, Chloé provides answers to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé offers advice on getting a talk accepted at an InfoSec conference. Dear Chloé, I’ve been trying to get my talk accepted at InfoSec conferences; however, I keep.
Hackers are routinely attempting novel ways to infiltrate corporate networks so it’s important to ensure that your employees are aware of how their online behavior can make them – and you – more vulnerable. Build securityawareness training modules to educate your employees on how to spot phishing emails or business-related scams.
For those unfamiliar with Fogg's work, he started out doing research on Persuasive Technology back in the 90s, which has become the basis for most modern uses of technology to influence people (for example, use of Facebook user data to influence the 2016 US Presidential Election). Well, low-and-behold, it already exists!
Officials from the National Institute of Standards and Technology (NIST) this week teased future improvements to the agency’s recently introduced “Phish Scale” measurement system, which helps companies determine whether phishing emails are hard or easy for their employees to detect.
Too many folks focus on the technology as opposed to the people or process. When budgets tighten and we're still responsible for moving the security forward, we should look to the policies, procedures, and controls and which ones can we shore up, what can we do to block/tackle those things we've been putting off, etc.
House Oversight and Homeland Security committees last week, SolarWinds’s former and current CEOs blamed an intern for creating a weak FTP server password and leaking it on GitHub – an act which may or may not have contributed to a supply chain hack that impacted users of the tech firm’s Orion IT performance monitoring platform.
The customer is apparently seeking guidance on integrating infosec into the development process, which begs the question "Which development process?". Reducing the problem to its fundamentals, there is a desire to end up with software/systems that are 'adequately secure', meaning no unacceptable information risks remain.
That's a heady mix of laws and regs that apply to the organisation, its officers and workers, its property and finances, its technologies, its contracts, agreements and relationships with employees and third parties including the authorities, owners, suppliers, partners, prospects and customers, and society at large. All requirements?!
There's no shortage of guidance available today about how to structure, build, and run a security program. Most guidance comes from a standpoint of inherent bias, whether it be to promote a product class, specific framework/standard, or to best align with specific technologies (legacy/traditional infrastructure, cloud, etc.).
The city has a more established IT setup, including a full-time IT director, which many of the smaller towns lack, according to this Government Technology article. We use this type of model for our 'Whole of State' approach to security in North Dakota," says Michael Gregg, CISO for the State of North Dakota. This is a great approach.
Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides advice to readers’ questions to help guide them as they navigate the technology industry. Dear Chloé, I.
Zero-trust encompasses a variety of technologies, from strong identity systems to microsegmentation. The post Zero-Trust Network Access: Why so Many Teams Get it Wrong appeared first on Security Boulevard. Why are so many organizations getting it wrong?
In this episode, Tom shows off AI generated images of a “Lonely and Sad SecurityAwareness Manager in a Dog Pound” and the humorous outcomes. The conversation shifts to Apple’s upcoming support for Rich Communication Services (RCS) and the potential security implications.
Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides answers to readers’ questions to help guide them as they navigate the technology industry. The post Ask Chloé: Reducing Biased Language in Job Descriptions appeared first on Security Boulevard. Dear Chloé, I’ve been told.
Award-winning security transformation manager and digital anthropologist Lianne Potter joins us to discuss the fascinating topic of digital anthropology and how we can rehumanize cybersecurity.
We cover how empathy relates to cybersecurity in the industry, the importance of being empathetic in our roles as […] The post Exploring the Role of Empathy in Cybersecurity with Andra Zaharia appeared first on The Shared Security Show.
on securityawareness which is already in the plan anyway: maybe we should mention A.7.2.2 Ben Woelk, program manager for the Information Security Office at Rochester Institute of Technology, has published a detailed ISO comms plan - 16 pages laying out all the things they planned to communicate as part of their ISMS.
Finally, we […] The post The FBI’s Qakbot Takedown, QR Code Phishing Attacks, Dox Anyone in America for $15 appeared first on Shared Security Podcast. In this episode we discuss the FBI’s remarkable takedown of the Qakbot botnet, a saga involving ransomware, cryptocurrency, and the FBI pushing an uninstaller to thousands of victim PCs.
In episode 327 Tom, Scott, and Kevin discuss the findings from Mandiant’s M-Trends 2024 report, highlighting a significant rise in traditional vulnerability exploitation by attackers while observing a decline in phishing. Despite phishing’s decreased prevalence, it remains the second most popular method for gaining initial network access.
In the milestone 350th episode of the Shared Security Podcast, the hosts reflect on 15 years of podcasting, and the podcast’s evolution from its beginnings in 2009. The ‘Aware Much’ segment focuses on […] The post Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits appeared first on Shared Security Podcast.
In this episode, noteworthy guest Tanya Janca returns to discuss her recent ventures and her vision for the future of Application Security. Tanya sheds light on her decision to partner […] The post Application Security Trends & Challenges with Tanya Janca appeared first on Shared Security Podcast.
Several major organizations, including British Airways and the BBC, fell victim to the recent MOVEit cyberattack. We discuss the alarming trend of hackers targeting trusted suppliers to gain access to customer data, potentially holding companies and individuals for ransom.
In this episode we speak with Kai Roer, a renowned author, security culture coach, and CEO of Praxis Security Labs. Kai shares his career journey in cybersecurity and emphasizes the importance of building a strong security culture within organizations.
At Social Engineer LLC, our purpose is to bring education and awareness to all users of technology. However, they will remember how you made them feel and that you treated them with empathy and compassion. Always remember, knowledge and skill have the best results when used ethically. Sources: [link]. Image: [link].
The post Truths and Myths of Privacy, Fake Shopping Apps, Borat RAT Malware appeared first on The Shared Security Show. Scott and Tom explain why privacy isn’t dead, why should everyone should care about their privacy, and how you should respond to someone that says “I don’t care about privacy, I have nothing to hide!”.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content