Cybersecurity Strategy. It’s Your Move...

Do you have what it takes to win the war on cybercrime? In this Experts Corner, Ajit Sancheti outlines three moves enterprise organizations can take to position themselves for the worst. It's your move.

It Takes A Village, And A Town Square

When thinking about the elements of a village, you may think about people, homes, transportation and commerce. However, there’s another critical component that sits passively in the backdrop yet plays a very frontal role. In this Experts Corner, Ryan Stolte connects the town square to the business bringing together people, process, and technology to reduce cyber risk.

2 Factors Might Be Better Than 1, But Is It Enough?

‘Compliance does not equal security’ was the mantra of this session called Two-Factor Isn’t Enough – We Show You Why. Ryan Rowcliffe of SecureAuth reminded us that merely having a two-factor authentication technology in place isn’t nearly safe enough because when it comes to convenience, people will almost always eschew security measures.

Curiosity Killed the Cat and Other Cybersecurity Horror Stories

When the weakest link in a business’ IT security is “end users who…are too easily fooled by social engineering attacks,” how do you protect your organization? Here are two studies that show just how foolish people can be.

Cybersecurity? There's No Accounting for Human Weakness

Cybersecurity only works if you actually implement it – otherwise, it’s like having a state-of-the art alarm system on your house but then leaving the bedroom window open for fresh air. Unfortunately, the weakest link in the security chain comes down to the end users.

5 Tips for Making the Most of the Black Hat Business Hall

There are no fewer than 256 companies (as of this writing) with reserved booths at Black Hat USA 2016 this year. As you plan your navigation of the hall to see that many vendors, there is a lot to consider. Sean Martin offers 5 tips and tricks to help Black Hat attendees make the most of their time on the Expo floor.

Healthcare Under Attack: Report

At the end of June 2016, bad actors published 10,000,000 stolen record for sale. Experts in cybersecurity, Andrew Komarov, Balázs Scheidler and Adam Laub, discuss findings uncovered in a recent InfoArmor report: Healthcare Under Attack: Cybercriminals Target Medical Institutions.

What To Expect At Black Hat USA 2016 | Women in Cybersecurity Briefings and Trainings

Previously, we brought you details of the Mobility, Microsoft, IoT and AppSec Briefings taking place at this year’s Black Hat 2016 event in Las Vegas.  We've even given you a Top 10 list to help narrow things down a bit. Now comes the training and briefings from the woman’s point of view; Women in Cybersecurity takes the showcase stage here on IT Security Planet.     

What to Expect at Black Hat USA 2016 | Mobility Briefings

The Black Hat Briefings are fast approaching at Mandalay Bay Resort and Casino, Las Vegas. The flights are booked and registration forms are completed in full. This conference, which brings scores of briefings to life each year, was created nearly 20 years ago to provide InfoSec professionals a place to gather and learn from the very best what the very latest risks and trends are in the information security world.

Cyber Risk Leadership: Essential Leadership Lessons from Malcolm Harkins

Malcolm Harkins, CISO at Cylance, discusses the difference between leadership and management in the InfoSec space where 95% of a company leader’s time tends to be spent on preventing negative outcomes rather than promoting positive outcomes.

Security Versus Convenience: A 1-on-1 with Chenxi Wang

Chenxi Wang, Chief Strategy Officer of Twistlock, weighs in on the risk versus benefit trade-off of sending personal information online, why no security system is safe 100% of the time, and whether Apple is being too stubborn or the FBI is being too “Big Brothery” when it comes to privacy versus security. 

5 Women in Security Who Are Changing the InfoSec Industry

Are you a woman in tech? If so, you're one of only a few in the women to make up a mere 10% of the InfoSec workforce. For the 3rd year in a row, ISSA-LA hosted one of the most sought-after sessions: the Women In Security panel, which featured five women from a diverse selection of backgrounds.

Twitter Profiles for 14 Groups Supporting Women in Technology and Cybersecurity

Enclosed in this slideshow is a list of the Top 14 Twitter pages devoted to women in the fields of technology and cybersecurity. These groups generally help women connect with, learn from, and support each other throughout their career growth journey. If you wish to improve your skills, change your job, or pursue a new career in the InfoSec world, then these are the Twitter profiles for you to follow and support.