This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
History offers plenty examples of this, such as the 2008 global financial crisis , fueled by weak oversight in the finance sector, and the unchecked spread of disinformation across social media platforms today. When technological advancements go unchecked, they can have serious consequences. AI amplifies these risks exponentially.
In this blog, I’ll be exploring some of the main cracks in current cybersecurity defence approaches specifically around Secure Operation Centres (SOCs) and the value that CISOs and ITDMs are currently getting from their internal teams and third-party providers. You witnessed this during the 2008 recession when the FBI reported a 22.3%
During my career, in the UK, up until now, there have been 3 periods of recession – the early 90s when I just graduated, the Great Recession (2008-2009), and the Covid-19 Recession (2020). Be accountable and transparent. Caring for your team’s health and well-being. Relational needs are a key differentiator.
Acknowledgement from someone in the field for my Koobface Gang research from 2008 to 2013. Together, we can hold the industry accountable for its promises. Back in the day Facebook's CISO was Joe Sullivan who I never really knew or got approached by. What do you want? How can we assist? It is a call to action.
Born from two board members of AVG Technologies, Evolution Equity Partners started in 2008 to help US and European-based entrepreneurs in cybersecurity, enterprise software, and consumer-enterprise crossover segments. In 2008, the Washington, DC-based firm made a prudent decision by shifting its focus to cybersecurity.
The year was 2008. The password for my test account there.well, I was using it in some other places. I had replaced it almost everywhere, but it was still used on a few places I had forgot about, like LinkedIn and a hotmail account I used to have so I could use MS Messenger. Who was the "CISO" for our organization?
Former Medallia VP of Cloud Security and current Chief Information Security Officer (CISO) at Inspectiv , Ray Espinoza , has spent over 15 years working in security information management. Back in 2008 when Ray built eBay’s security operations center (SOC), “data access” was all the rage. Ask the Expert.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content