article thumbnail

Recap: Black Hat USA 2021

Veracode Security

In addition to hosting a Cards and Coding virtual casino night to discuss the future of cybersecurity (and give away some prizes), we held a Lunch & Learn with Wallace Dalrymple, CISO of Emerging Markets at Advantasure. If you missed the Lunch & Learn, you can read Advantasure’s full story here to see how they got it done.

article thumbnail

Healthcare Cyberattacks Lead to Increased Mortality, Lower Patient Care: Ponemon Study

eSecurity Planet

Ponemon chairman and founder Larry Ponemon said in a statement that “Most of the IT and security professionals regard their organizations as vulnerable to these attacks,” and that growing adoption of technologies such as cloud, mobile , big data , and the Internet of Things (IoT) are adding to that risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Recap: Black Hat USA 2021

Security Boulevard

In addition to hosting a Cards and Coding virtual casino night to discuss the future of cybersecurity (and give away some prizes), we held a Lunch & Learn with Wallace Dalrymple, CISO of Emerging Markets at Advantasure. From Big Data to Open Source.

article thumbnail

MY TAKE: For better or worse, machine-to-machine code connections now form much of the castle wall

The Last Watchdog

The explosion in the number of human and non-human identities in the public cloud has become a security risk that businesses simply can’t ignore,” observes Eric Kedrosky, CISO at Sonrai Security. And the solution seems obvious: Big Data. I’ve had a couple of deep discussions with Kedrosky about this. This is not anything new.

Software 200
article thumbnail

Federal cybersecurity: breaking down the barriers to adoption

Thales Cloud Protection & Licensing

Furthermore, over 80% of agencies feel they are already vulnerable to a data breach. With New York’s CISO regulation, California’s Internet of Things (IoT) law and Europe’s General Data Protection Regulation (GDPR), the future of big data looks to be massively regulated. Regulations Stoke the Flames.

article thumbnail

Holes in Linux Kernel Could Pose Problems for Red Hat, Ubuntu, Other Distros

eSecurity Planet

Both seem to need a user account already existing on a targeted device, which seems a surmountable barrier with all the credentials leaked in the recent past – here is how big data can be used in cyber-crime.”. Companies shouldn’t shrug off these vulnerabilities.

article thumbnail

3 Things Leaders Often Miss When Trying to Get More Women into Tech

Jane Frankland

Tech skills like programming, software development, big data, cybersecurity, cloud migration along with skills that computers can’t yet capably do, like creative thinking, problem-solving, negotiating, and applying emotional intelligence, are going to be in high demand. Contact TechTalent Academy now.