Do you have what it takes to win the war on cybercrime? In this Experts Corner, Ajit Sancheti outlines three moves enterprise organizations can take to position themselves for the worst. It's your move.
When thinking about the elements of a village, you may think about people, homes, transportation and commerce. However, there’s another critical component that sits passively in the backdrop yet plays a very frontal role. In this Experts Corner, Ryan Stolte connects the town square to the business bringing together people, process, and technology to reduce cyber risk.
‘Compliance does not equal security’ was the mantra of this session called Two-Factor Isn’t Enough – We Show You Why. Ryan Rowcliffe of SecureAuth reminded us that merely having a two-factor authentication technology in place isn’t nearly safe enough because when it comes to convenience, people will almost always eschew security measures.
When the weakest link in a business’ IT security is “end users who…are too easily fooled by social engineering attacks,” how do you protect your organization? Here are two studies that show just how foolish people can be.
Cybersecurity only works if you actually implement it – otherwise, it’s like having a state-of-the art alarm system on your house but then leaving the bedroom window open for fresh air. Unfortunately, the weakest link in the security chain comes down to the end users.
There are no fewer than 256 companies (as of this writing) with reserved booths at Black Hat USA 2016 this year. As you plan your navigation of the hall to see that many vendors, there is a lot to consider. Sean Martin offers 5 tips and tricks to help Black Hat attendees make the most of their time on the Expo floor.
It seems that fewer companies realize that there are different approaches to MAM. Expert Suzanne Dickson explores the pros and cons of the various enterprise mobile security options available.
At the end of June 2016, bad actors published 10,000,000 stolen record for sale. Experts in cybersecurity, Andrew Komarov, Balázs Scheidler and Adam Laub, discuss findings uncovered in a recent InfoArmor report: Healthcare Under Attack: Cybercriminals Target Medical Institutions.
Previously, we brought you details of the Mobility, Microsoft, IoT and AppSec Briefings taking place at this year’s Black Hat 2016 event in Las Vegas. We've even given you a Top 10 list to help narrow things down a bit. Now comes the training and briefings from the woman’s point of view; Women in Cybersecurity takes the showcase stage here on IT Security Planet.
There are many ways to get pwned during the Black Hat conference. IT Security Planet is running a Twitter poll to see how people plan to protect themselves from the onslaught of attacks.
Join us in Rome – one of the most beautiful ancient cities in the world. The premier software security conference for developers, auditors, risk managers, technologists and entrepreneurs will take place at the Rome Marriott Park Hotel, June 27th – July 1st.
So who’s ready for the Black Hat USA 2016 conference at the beautiful Mandalay Bay Resort and Casino, Las Vegas? Get registered now, if you haven’t already, as places are filling fast.
The Black Hat Briefings are fast approaching at Mandalay Bay Resort and Casino, Las Vegas. The flights are booked and registration forms are completed in full. This conference, which brings scores of briefings to life each year, was created nearly 20 years ago to provide InfoSec professionals a place to gather and learn from the very best what the very latest risks and trends are in the information security world.
Malcolm Harkins, CISO at Cylance, discusses the difference between leadership and management in the InfoSec space where 95% of a company leader’s time tends to be spent on preventing negative outcomes rather than promoting positive outcomes.
Chenxi Wang, Chief Strategy Officer of Twistlock, weighs in on the risk versus benefit trade-off of sending personal information online, why no security system is safe 100% of the time, and whether Apple is being too stubborn or the FBI is being too “Big Brothery” when it comes to privacy versus security.
The 8th Annual ISSA Los Angeles Information Security Summit was back at the Universal City Hilton again this year, drawing well over 700 registrants from all over Southern California, Arizona and Nevada. This post covers some of the highlights captured from this year's event.
Are you a woman in tech? If so, you're one of only a few in the women to make up a mere 10% of the InfoSec workforce. For the 3rd year in a row, ISSA-LA hosted one of the most sought-after sessions: the Women In Security panel, which featured five women from a diverse selection of backgrounds.
Wondering what to expect at this year's ISSA Los Angeles Information Security Summit? Christian Boden has the run-down for you here.
Enclosed in this slideshow is a list of the Top 14 Twitter pages devoted to women in the fields of technology and cybersecurity. These groups generally help women connect with, learn from, and support each other throughout their career growth journey. If you wish to improve your skills, change your job, or pursue a new career in the InfoSec world, then these are the Twitter profiles for you to follow and support.