Remove 2010 Remove Cyber Risk Remove Information Security Remove Technology
article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Brian Levine is senior director of product security at Axway, a global security engineering organization delivering training, tools, processes and DevSecOps practices for secure applications and cloud services to the enterprise market. He retired as a colonel in 2010. She is also the host of the Mastering Cyber podcast.

article thumbnail

How to build a cyber capable board

Security Boulevard

In just a few years, cyber has transformed from the nerd in the corner into the Kim Kardashian of risk. businesses can be built on, and destroyed by, cyber risk. Ask your cyber exec to explain the threats facing the organisation. Your HR, IT and security teams should work together on this?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IRISSCON 2023: OT, AI, and human empathy

BH Consulting

The operational technology challenge Ferguson outlined evolving threats to critical infrastructure, and how IT and operational technology environments are becoming increasingly interconnected and interdependent. Stuxnet in 2010 was the first the most recent was CosmicEnergy in 2023.

article thumbnail

MY TAKE: Identity ‘access’ and ‘governance’ tech converge to meet data protection challenges

The Last Watchdog

Curcio walked me through how identity management technologies evolved over the past two decades. Not long afterwards, in about the 2010 time frame, IAM vendors first arrived on the scene, including Optimal IdM, Centrify, Okta and CyberArk, followed by many others. Efforts to balance security and productivity sometimes backfired.