Remove 2005 Remove CSO Remove Hacking Remove Technology
article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

CSO's ultimate guide to security and privacy laws, regulations, and compliance Security and privacy laws, regulations, and compliance: The complete guide This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. NERC) standards.

CSO 128
article thumbnail

Jeff Moss on the Evolution of Hacking at SecTor 2021

ForAllSecure

Jeff Moss, ICANN CSO and founder of DEF CON/Black Hat, gave the keynote speech at SecTor 2021 in Toronto, Ontario. His talk was nostalgic, reflecting on the 40+ years of computer hacking. Moss also said that all hacking is not infosec and that all infosec is not hacking. But hacking, not so much. It’s a job.

Hacking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BEST PRACTICES: Why pursuing sound ‘data governance’ can be a cybersecurity multiplier

The Last Watchdog

Deploying the latest, greatest detection technology to deter stealthy network intruders will take companies only so far. I had the chance to sit down with Kris Lahiri, CSO and co-founder of Egnyte , one of the original EFSS market leaders. The wisdom of proactively purging stored data was driven home by the hack of Capital One bank.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Shah provides her expertise in hacking, software development, and kernel development and advocates for open source initiatives. Shah provides her expertise in hacking, software development, and kernel development and advocates for open source initiatives. Brian Krebs | @briankrebs. — Dave Kennedy (@HackingDave) July 15, 2020.