article thumbnail

Weaving strategies with policies

Notice Bored

As well as infosec policies, what are your business policies for managing the information risk security function? So-called artificial intelligence and machine learning are gaining traction, with robotics no longer the realm of science fiction. Virtual working is just one of several strategic issues.

Risk 66
article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

He also talks about the future generation of hacking, what motivates young people today to think outside the box in a world where infosec is increasingly becoming vocational and expected. Vamosi: There’s also a list of words commonly used in infosec that are being challenged. Vamosi: Hackers. Yes, we show you know this.

Hacking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISSPs from Around The Globe: An Interview with Theresa Grafenstine

CyberSecurity Insiders

And we wound our way to “Year 2000” ( Y2K ), which now seems sort of silly, but in retrospect, at the time it was a big deal. Now, launching into the private sector after life after government, the CISSP is absolutely incredibly important, because it's seen as an absolute commitment to the cyber and InfoSec profession.

article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Artificial intelligence and machine learning are an increasingly important part of this market, as automated cybersecurity tools need to be able to adjust as new threats emerge. DXC Technology has over 40 years of infosec experience, most of which as HPE’s Enterprise Services. Here are 11 of the top movers in the BAS market.