Remove Conference Remove Information Security Remove Malware
article thumbnail

RSA Conference 2015 – San Francisco 20-24 April 2015

CTOvision

Offering five full days of educational training from experienced industry practitioners, the RSA Conference is widely regarded as one of the world''s leading forums for enterprises and technical information security professionals. This year, the Conference will be held April 20-24 at San Francisco''s Moscone Center.

article thumbnail

Uptycs Identifies New Ransomware Binary Targeting Linux

SecureWorld News

Its malware is specifically geared toward ESXi hosts, as it contains two related commands. David Lingenfelter, VP of Information Security at Penn Entertainment, said during the recorded panel session: "Ransomware is just one of those things that's not going away. Its initial access vector remains unknown.

Linux 82
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Invincea Announces 54 New Enterprise Customers for Its Flagship Enterprise Solution, $8.1M in Advanced Research Contracts for Its Labs Division

CTOvision

In the first quarter of 2014, the company’s advanced research division—Invincea Labs—secured $8.1M in new contracts for advanced cybersecurity projects for defense and federal government agencies in the areas of cloud-based advanced malware analysis, spear-phishing attacks against Android, and big data analytics for compromise detection.

CTO Hire 255
article thumbnail

Spotlight on Cybersecurity Leaders: Kip Boyle

SecureWorld News

Kip Boyle is the virtual Chief Information Security Officer (vCISO) for several companies. A : Application control so we can run computers using "allow lists" which would block all software that was not authorized, especially malware. See the conference agenda and register here.

article thumbnail

Why Taylor Swift Fans Should Work in Cybersecurity

SecureWorld News

These skills also happen to apply to information security (infosec) and cyber threat intelligence and research. And you'll leave your first infosec conference with an armful of them. Taylor may be the Mastermind behind the clues, but her fans' determination, critical thinking, and unparalleled passion deserve more credit.

Network 90
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

I went to smaller conferences. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. What if you are a woman in information security? My first day at ZDNet there was a virus blowing up and my editor asked if I could do a story on that. So I learned.

article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

.” Two decades later, that line from the Microsoft co-founder’s Trustworthy Computing memo would seem quaint if the reality weren’t so terrifying: ransomware, software supply chain attacks, privacy breaches, nation-state hacks, malware, worms, and adversarial machine learning are just a few of the looming threats.

Microsoft 105