This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In a 2016 New York Times Magazine profile of Ben Rhodes, President Obama’s then deputy national security adviser for strategic communications, Ben was quoted as calling the American foreign-policy establishment “the Blob.”
Read Adrien Gendre’s analytical article about why anonymity is an important aspect of supply chain security on Infosec Magazine : The SolarWinds breach of 2020 was widely considered the biggest cyber-attack in history. Just three months later, the Microsoft Exchange hack took its place.
Read Liqaa Nawaf explain how artificial intelligence can help in optimizing Internet of Things security on Infosec Magazine : The Internet of Things (IoT) is growing rapidly in the markets […].
Read Kirsten Provence argument for a centralized supply chain program on SecurityMagazine : Finding efficiencies in supply chain security is as simple as enveloping more of your supply chain.
Read why Dmitry Raidman says that detecting and mitigating Internet of Things data breaches requires an inside-out approach on Infosec Magazine : A 2020 Business Insider Intelligence research report predicts […].
Read why Dan Raywood says that companies don’t provide secure tools for remote workers risking their cyber assets on Infosec Magazine : The number of employees working from home is […].
Read why Tom Miller says that company security officers need a more comprehensive insider threat solution after the coronavirus pandemic on SecurityMagazine : COVID-19 has initiated a whole new […].
In 2021’s first quarter, nearly 140 organizations reported being impacted by a supply chain attack, which saw an increase of 42% during the period compared with the prior quarter, according to the nonprofit Identity Theft Resource Center (ITRC).
Read Raef Meeuwisse explain why artificial intelligence is becoming a vital component of cyber strategy on Infosec Magazine: Most security departments will acknowledge that their resources are already spread too […].
Read Raef Meeuwisse explain the interesting link between the Coronavirus epidemic and the cybersecurity threat landscape on Infosec Magazine : Cybersecurity professionals are always interested in understanding how evolving events shape the threat landscape.
We help enterprises build action plans to mitigate risks and improve their security posture. Every person with a computer or phone has information at risk and should take personal responsibility for improving their security posture. Use a modern anti-virus system on your PC or Mac ( Norton Security). Use Google mail.
One Identity named Hot Company: Privileged Access Management (PAM) in 12th Cyber Defense Magazines Annual InfoSec Awards during CyberDefenseCon 2024. Miliefsky, Publisher of Cyber Defense Magazine.
Read Heidi Parthena White write about the data security and third-party asset disposition paradox on Infosec Magazine: Data security is a hot topic these days, and for good reason. In […].
Read why Ken Mafli says it is necessary to protect the edge computing environments from cyberattacks on Infosec Magazine : The best attacks are the ones you never see coming. While most data centers are the focus of cybersecurity hardening, edge computing environments can sometimes be overlooked.
Read why Michael Cade says that it is important to keep your data secure in the 24/7 world on Infosec Magazine : The nature of the modern business is to keep systems ‘always-on.’ As competition rises across all industries, maintaining customer service and experience is of the upmost importance.
Recommended reading to any in the national security sector since everyone is going through this now: Inside the Air Force’s […]. A friend brought this article to our attention (Thanks Bob).
Read Rob Acker explain what ISO 27001 certification is and how it will help your organization on Infosec Magazine: Organizations adjusting to remote working are facing unprecedented information security challenges. […].
Read Damian Tiller take a look at the scientific data integrity and security in the cloud on Infosec Magazine: Companies in the life sciences space often generate loads of data—that […].
On August 27, LogRhythm hosted a panel focused on “Tapping Global Threat Intelligence to Secure Enterprise Networks” at Ruth’s Chris Steakhouse in Crystal City. Discussions began with a question to the panel addressing the biggest threat to the United States’ national security. By Katie Kennedy.
Read why Paul Edon says that CISO’s role in 2020 is more getting more diversified on Infosec Magazine: As the senior security role inside many corporations continues its inexorable elevation […].
Read Brent Whitfield explain how businesses can minimize the risk of physical and cyber insider threat during coronavirus pandemic on SecurityMagazine : Many businesses have severely reduced their operations […].
Read Dan Raywood list top ten worst vulnerabilities on Infosec Magazine : Vulnerabilities proved to be one of the main security trends of 2019. Industry research […].
The American and Chinese teams both published their papers in this month’s Nature magazine , while the Netherlands research is available as a pre-print. First, because it brings us closer to actually having secure quantum networks. And the Chinese team used clouds of rubidium atoms. This is a big deal for two reasons.
Read Mike Klepper explain how you can use technical controls to mitigate security risks on Infosec Magazine : In an ideal world, it would be possible for organizations to prevent hacking. Given the many routes into any given business coupled with social engineering tactics, it’s impossible to prevent hacking altogether.
Read Michael Gips and Louis Mizell take a look at the machinations of the insider threat on SecurityMagazine : Found to be plotting the mass murder of liberal politicians and cable news hosts, former U.S. Coast Guard Lieutenant Christopher Hasson received a 13-year sentence in federal court in late January 2020.
Read Michael Usiagwu explain how you can protect your enterprise cloud phone system against cyber attacks on Infosec Magazine : IP telephony has been popular among companies looking to transform their voice communications or make their existing communications systems more unified, but also need to ensure that they are secure.
the middle column), but tended more to networking topics, from "When animals attack…networks" to the story of networking's most famous couple, Alice and Bob of security lesson fame. The story approach was modeled somewhat after the Wall Street Journal's famed and quirky front page A-Hed articles (i.e.,
Congratulations to my friends at "On The FrontLines Magazine" for an EXCELLENT presentation of important operational and managerial cloud computing transition lessons. A few of the educational gems enclosed in this 20 PAGE ISSUE: Matt Goodrich, FedRAMP Program Manager, GSA - “The first one is security is largely not a technical issue.
Read Chris Clements explain how users can defend against the Internet of Things security threats on SecurityMagazine : According to IDC, by 2025 there will be 41.6 billion Internet […].
We would do everything from placing sugar packets under rolling obstacles on the obstacle course so they didn't move and we could move faster, or shoving extra ammunition magazines in every conceivable spot on our persons we could find. cyber security. Read more Categories: Strategy. advanced persistent threat. cybersecurity.
Read why Marc Wilczek says that small and medium enterprises need to invest in cybersecurity on Infosec Magazine : Cyber-attacks have hit, and hurt, companies of all shapes and sizes.
Read why Jim Sounders says that it is essential to have flexibility in vulnerability management on Infosec Magazine : When you consider that cybercrime is projected to cost $6 trillion annually by 2021 , securing the endpoint becomes an absolute priority as 80% of cyber-attacks happen at the endpoint today.
He is highly regarded for his mastery of network cyber security, IP communications technology and TCP/IP networking. Sean is serving as a guest editor for a feature topic for IEEE Communications Magazine , the industry's source for coverage of advances in communications and networking. He is an engineer's engineer. DDoS attacks).
Today I am especially proud and honored to publicly announce my appointment to the IEEE Cloud Computing Magazine Editorial Board ! Dr. Michaela Iorga the senior security technical lead for cloud computing at the National Institute of Standards and Technology‘s computer security division.
The latest technology used by Apple and Google to meet consumers’ demands on securing private data is hitting a nerve with the Department of Justice. h+ Magazine | AnimalTech – Wearable Technology for Fido – h+ Magazine. New encryption technology hits nerve with DOJ. WASHINGTON, D.C. Read more on NPR (blog).
NCOIC’s Kevin Jackson to present new process for creating interoperability via a cyber-secure multi-cloud environment at cloud computing conferences in the U.S. Now we have developed a more general set of checklists, rules and patterns that promotes secure and reliable data exchange.”
Read Philip James explain how companies can start using the zero trust model to prevent phishing on SC Magazine : Currently, the majority of all cyber attacks can be traced back to phishing. It’s become THE most common way for breaches to happen — both to businesses and individuals. In fact, nearly 60 percent of […].
As an information security trailblazer, Mr. Bigman participated in developing security measures for Government computers well before commercial industry found the Internet. Bigman worked in every area of information and data security, the last fifteen years as the Agency’s Chief Information Security Officer (CISO).
SC Magazine summarized Bob's points this way : With the many of the major hacks still taking place through a single point of vulnerability, two security industry pros said its time for organizations to make sure their workers understand the importance of cyber security and actively take part in defending their company.
Enterprise security company, Palo Alto Networks has announced the latest release of its virtual firewall series (VM-Series). Read more on ADT Magazine. Cloudera CTO on Big Data analytics and security risks. Palo Alto unveils latest release of virtual firewall series. and Hortonworks Inc.
Recently, he was named a “Cyber Security Visionary” by U.S. Black Engineer and Information Technology magazine. He is the founder and author of “Cloud Musings”, “Cloud Musings on Forbes”, and the founder and editor of Government Cloud Computing on Ulitzer electronic magazine. ? Grab this Headline Animator ( Thank you.
We were pleased to see CSO magazine produce a feature focused on military veterans who have made the transition from active duty to civilian life in the cybersecurity domain (see: Hacked Opinions: Veterans who transitioned into InfoSec ). Core cyber security skills and experience are still in demand. Army Colonel.
Congratulations to my friends at "On The FrontLines Magazine" for an EXCELLENT presentation of important operational and managerial cloud computing transition lessons. A few of the educational gems enclosed in this 20 PAGE ISSUE: Matt Goodrich, FedRAMP Program Manager, GSA - “The first one is security is largely not a technical issue.
The publicly-traded company used security purchase agreements via private placements of convertible preferred stock. Maven has a coalition of more than 250 brands, including TheStreet.com, History, Maxim, Ski Magazine, and others. sold the magazine’s print and digital publishing rights to Maven last year.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content