This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Predictive Analytics – 2015 will be the year where Gov CIOs ask for simulated data versus “post-mortem” analysis to create better decision through analyzing scenarios. IaaS, SaaS & PaaS will go mainstream with Gov IT as data center consolidation will enable secure and reliable delivery of virtualized data solutions.
14, 2015 /PRNewswire/ -- The National Cyber Security Hall of Fame has released the names of five innovators who will be inducted into the Hall of Fame at its award ceremony on Thursday, October 29 , at the Four Seasons Hotel in Baltimore, Maryland. Editor's note: I was so excited to read of this year's inductees. BALTIMORE , Sept.
Most corporate hacks we see are focused on either customer data (credit cards, medical records, socialsecurity numbers, passwords, bank account information, email addresses) or company proprietary documents. The #SonyHack was not a run-of-the-mill corporate hack, like we see every week in just about every sector. Game Change.
Faced with the demands for process management, enterprise search, access beyond the firewall, mobile device support, social interaction, and cloud deployment, enterprises have been sold add-on modules and product integrations to enable wall-to-wall content management across the enterprise and outside its walls. ECM Hurdles.
He co-founded Room on Call (now Hotelopedia) in 2015, where he set up the complete technology infrastructure, development, product management, and operations. Prior to joining Fractal, Tiwari was senior vice-president and global CISO at Airtel, where he set up the managed security services initiative Airtel Secure for Business.
With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat.
With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat.
This latter scenario has been driven by the lack of industry consensus on security and a dearth of nonvendor specific cloud security training and certifications. A specific example of strong industry cloud security capabilities is Dell SecureWorks. Jackson 2015 ) Follow me at [link].
This latter scenario has been driven by the lack of industry consensus on security and a dearth of nonvendor specific cloud security training and certifications. A specific example of strong industry cloud security capabilities is Dell SecureWorks. Jackson 2015 ) Follow me at [link].
Topics include: The chief informationsecurity officer (CISO) role in cybersecurity Security attacks and countermeasures Mobile device security U.S. Jackson 2015 ) Follow me at [link]. Dell sponsored this article, but the opinions are my own and don't necessarily represent Dell's positions or strategies.
This alarming statistic is just one of the reasons why the National Cybersecurity Institute at Excelsior College (NCI) undertook the task of surveying the nation’s chief informationsecurity officers. Which of the following are the top five sources of application security risk within your organization?
The consumerization of IT and the adoption of cloud, mobile and social media by enterprise organizations is opening a new threat landscape and new threat vectors. The emerging science of digital forensics and cybercrime investigation has become very important for national security, law enforcement, and information assurance.
While many people might think of Russian state-sponsored hacking groups when it comes to infiltrating social media platforms, there’s actually a global network of hackers participating in an underground economy where things like Facebook and Instagram accounts are commodities.
He said hackers and researchers really lead the way by discovering new classes of vulnerabilities, by exposing poor security practices, and spurring public debate about informationsecurity. He said, "the better you understand the risks, the better informed your decisions will be." He said security work is that like that.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content