Remove Development Remove Information Security Remove Symantec
article thumbnail

CIT Hires Robert Stratton as MACH37 General Partner

CTOvision

Stratton adds experience in information security and entrepreneurship to MACH37™. His experience in the information security industry will be highly valuable as we move forward with the first cohort session.”. Stratton comes to MACH37™ from Polymathics, a technology startup advisory and security strategy firm.

article thumbnail

RSA Conference 2015 – San Francisco 20-24 April 2015

CTOvision

Offering five full days of educational training from experienced industry practitioners, the RSA Conference is widely regarded as one of the world''s leading forums for enterprises and technical information security professionals. See promising young companies who are developing the next generation of cyber security solutions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Broadcom’s Approach Towards Delivering Customer Value

CIO Business Intelligence

We pull several levers to achieve this, for example: Using a product-first approach, we focus on developing solutions that can adapt to support customer needs today or in 10 years. We are known for producing industry-leading products that are customer-centric.

Vmware 244
article thumbnail

The Sony Hack in Context

CTOvision

Indeed, penetrations of corporate information systems are so widespread, persistent and severe that government agencies and cyber security firms such as Symantec independently estimate America is losing “hundreds of billions” of dollars in intellectual property per year. trillion F-35 Joint Strike Fighter.

article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

This forces IT and information security specialists to constantly enhance protection to effectively counter information security incidents related to malware distribution through rogue websites, links, and email attachments. At the same time, attackers constantly devise new methods and variants of online threats.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

CareFusion’s parent company Becton Dickinson responded, saying that all 14 hundred and 18 of the identified vulnerabilities were within third-party software applications including Windows XP and Symantec pcAnywhere, and others. Microsoft, for example, stopped patching Windows XP for security vulnerabilities in 2014.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. Can we use them?

System 52