article thumbnail

Herjavec Group Wins 4 Cyber Defense Magazine Global InfoSec Awards

Herjavec Group

HG Phishing HG Vulnerability Management . We were founded in 2003 when cybersecurity was purely a technology issue. About CDM InfoSec Awards . This is Cyber Defense Magazine’s ninth year of honoring global InfoSec innovators. Join a webinar at [link] and realize that infosec knowledge is power. . HG Threat

InfoSec 52
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

How to screen for natural infosec talent: Ask for a worst case scenario for any common situation. Street is an industry-respected speaker and analyst and currently is the VP of InfoSec for SphereNY. Markstedter actively contributes to filling the infosec education gap. — Jack Daniel (@jack_daniel) October 10, 2018.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Herjavec Group is Recognized by Cyber Defence Black Unicorn Awards

Herjavec Group

He founded Herjavec Group, in 2003, introducing the first managed firewall in the Canadian Market. Along with these contributions, Robert is active in a number of impactful infosec initiatives. HG Phishing HG Vulnerability Management . Connect with Robert. HG Mana ged Detection & Response (MDR) . HG Threat .

InfoSec 52
article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

M]uch of InfoSec management falls back on employee training and avoiding employee error – particularly with respect to phishing , spear phishing, and encryption lapses.”. See the Best Cybersecurity Awareness Training for Employees. Compliance can sometimes hinder real security and real data privacy.

article thumbnail

Top Web Application Firewall (WAF) Vendors

eSecurity Planet

Founded in 2003, Barracuda Networks is a Campbell, California-based vendor of network appliances and cloud services. In 2003, the California upstart WEBcohort was an early provider of web application firewall technology. Attackers can steal or phish users for their session ID and then use it to access the application.