The digital world has become a scary place, one in which few small- and medium-sized businesses (SMBs) feel that they are adequately protected. Jeremy Wittkop, CTO of InteliSecure, outlines the steps necessary to achieve effective information security through identification and prioritization of key assets most important to a business.
Enterprises are struggling to find secure ways to allow trusted users access sensitive data. Traditional security models designed to protect limited entry points to the data are no longer viable. These best practices, presented by Gurucul’s CEO, Saryu Nayyar, can help address the challenges.
Source documents sent for translation often contain sensitive information, and data corruption in the language industry can be extremely damaging for companies. Making sure your language provider has established a strong information security management system is imperative.
Xuan Zhao, a female data scientist in the information security industry, explains how machine learning dramatically helps her work have a true impact on society, and vice versa.
Robert Simmons thinks of his mom and grandmother when defending all computer users from cyber threats that can strip them of their identities and money. This InfoSec professional believes a safe and level Internet playing field will be achieved by meticulously observing data patterns to illuminate the most dangerous network risks.
If we continue to treat information security as the brakes on a vehicle, we will likewise continue to find we can’t speed the business up to its fullest capacity.
Cinthya Grajeda-Mendez, the first and only female to ever join the UNH Cyber Forensics Research & Education Lab, has twice found herself in a field dominated by men. From the military to cyber forensics, this 4’9” woman is the epitome of never giving up on your dreams and not taking “no” for an answer.
The Payment Card Industry Security Standards Council has updated its data security standard. PCI DSS 3.2 went into effect November 1, which means many organizations are now scrambling to come into compliance--while also preparing for the busiest time of the year.
With more than 25 years’ experience in the IT field, ISACA Director Jo Stewart-Rattray has a lot of experience and advice to share. Determine what you want to do in technology, find your own path, and make it happen. And until you’ve actually tried something, don’t place imaginary obstacles in your own path.
The relatively new field of privacy is a striking example of a profession that gets gender equity right. Will this equality last or will the industry slowly laud more men as leaders like the InfoSec space?
When overcoming the roadblocks on the path to diversity in the tech or InfoSec fields, make sure that the roadblock isn’t yourself. Rachel Phillips of Moss Adams shares how she removed the obstacles that were preventing her from getting her dream job as a cybersecurity professional — which turned out to be her own biases.
While it may be impossible to completely prevent all types of security breaches, there are certainly steps you can take to make sure you don’t become another headline. Satyendra Tiwari shares his 8 tips to help prevent security breaches.
Wondering what to expect at this year's ISSA Los Angeles Information Security Summit? Christian Boden has the run-down for you here.