Remove 2000 Remove Data privacy Remove Social Engineering
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

I held this position from 2000 through 2014, during which time Windows emerged as a prime target for both precocious script kiddies and emerging criminal hacking rings. Erin: What are some of the most common social engineering tactics that cybercriminals use? How did you first get interested in cybersecurity as a career?

article thumbnail

And the Winner of the 2021 RSAC Innovation Contest is…

eSecurity Planet

Founder and CEO Eric Olden led Oracle’s identity security division twenty years ago and was a co-creator to the creation of SAML in 2000. As mentioned in their presentation, socially engineered attacks are the most costly security threat at $2.1B Abnormal Security. in 2020, second only to ransomware.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Individuals, small businesses, and enterprise organizations all rely on encryption to securely store and transfer sensitive data across wide-area networks (WAN) like the internet. Application developers managing sensitive user data must especially beware of increasing regulatory action surrounding data privacy.

article thumbnail

Bytes, Books, and Blockbusters: The NetSPI Agents’ Top Cybersecurity Fiction Picks

NetSpi Executives

With its complex characters and intricate plotting, Cryptonomicon delves into the implications of data privacy and the power of information in both wartime and peace. Through this, the film raises awareness about data privacy, the implications of corporate surveillance, and the moral complexities surrounding information access.