Remove Conference Remove Information Security Remove Malware
article thumbnail

RSA Conference 2015 – San Francisco 20-24 April 2015

CTOvision

Offering five full days of educational training from experienced industry practitioners, the RSA Conference is widely regarded as one of the world''s leading forums for enterprises and technical information security professionals. This year, the Conference will be held April 20-24 at San Francisco''s Moscone Center.

article thumbnail

Invincea Announces 54 New Enterprise Customers for Its Flagship Enterprise Solution, $8.1M in Advanced Research Contracts for Its Labs Division

CTOvision

In the first quarter of 2014, the company’s advanced research division—Invincea Labs—secured $8.1M in new contracts for advanced cybersecurity projects for defense and federal government agencies in the areas of cloud-based advanced malware analysis, spear-phishing attacks against Android, and big data analytics for compromise detection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Uptycs Identifies New Ransomware Binary Targeting Linux

SecureWorld News

Its malware is specifically geared toward ESXi hosts, as it contains two related commands. David Lingenfelter, VP of Information Security at Penn Entertainment, said during the recorded panel session: "Ransomware is just one of those things that's not going away. Its initial access vector remains unknown.

Linux 85
article thumbnail

Spotlight on Cybersecurity Leaders: Kip Boyle

SecureWorld News

Kip Boyle is the virtual Chief Information Security Officer (vCISO) for several companies. A : Application control so we can run computers using "allow lists" which would block all software that was not authorized, especially malware. See the conference agenda and register here.

article thumbnail

‘Embrace the red’: Microsoft puts up another $4M for cloud and AI bugs in broader security push

GeekWire

Microsoft, under intense pressure to better protect its systems and customers from cyberattacks, will answer that question by giving its top security execs a prime spot on stage Tuesday morning at its annual Ignite conference for IT pros in Chicago. The next month, Nadella declared that it was.

Microsoft 109
article thumbnail

Why Taylor Swift Fans Should Work in Cybersecurity

SecureWorld News

These skills also happen to apply to information security (infosec) and cyber threat intelligence and research. And you'll leave your first infosec conference with an armful of them. Taylor may be the Mastermind behind the clues, but her fans' determination, critical thinking, and unparalleled passion deserve more credit.

Network 94
article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

.” Two decades later, that line from the Microsoft co-founder’s Trustworthy Computing memo would seem quaint if the reality weren’t so terrifying: ransomware, software supply chain attacks, privacy breaches, nation-state hacks, malware, worms, and adversarial machine learning are just a few of the looming threats.

Microsoft 106