article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

I held this position from 2000 through 2014, during which time Windows emerged as a prime target for both precocious script kiddies and emerging criminal hacking rings. Erin: What are some of the most common social engineering tactics that cybercriminals use? How did you first get interested in cybersecurity as a career?

article thumbnail

And the Winner of the 2021 RSAC Innovation Contest is…

eSecurity Planet

Founder and CEO Eric Olden led Oracle’s identity security division twenty years ago and was a co-creator to the creation of SAML in 2000. As mentioned in their presentation, socially engineered attacks are the most costly security threat at $2.1B Abnormal Security. in 2020, second only to ransomware.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Individuals, small businesses, and enterprise organizations all rely on encryption to securely store and transfer sensitive data across wide-area networks (WAN) like the internet. Application developers managing sensitive user data must especially beware of increasing regulatory action surrounding data privacy.