Remove Architecture Remove CISO Remove Social Engineering Remove Technology
article thumbnail

Nurturing Our Cyber Talent

IT Security Guru

The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry. We must reduce barriers to entry.

CISO 94
article thumbnail

Sunsetting legacy Cybersecurity Process for Better Optimization and Security Modernization

Security Boulevard

The cost of sunsetting security products, legacy applications, and legacy technology imposes a financial strain on every organization. Before considering sunsetting technology products, most SecOps and DevOps teams focus on evaluating and updating, if possible, legacy processes, including developing a legacy-system modernization workflow.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inflation Is Making Cybersecurity Even More Challenging for Leaders

SecureWorld News

I think it requires taking a step back and assessing what you can do with less," said Chris Roberts, CISO and Senior Director at Boom Supersonic. Too many folks focus on the technology as opposed to the people or process. Andrew Smeaton, CISO at Afiniti, says reassessment of cybersecurity programs and plans is necessary.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Brian Levine is senior director of product security at Axway, a global security engineering organization delivering training, tools, processes and DevSecOps practices for secure applications and cloud services to the enterprise market. Todd Bell serves as the chief information security officer and executive director at Valleywise Health.

article thumbnail

ROUNDTABLE: Why T-Mobile’s latest huge data breach could fuel attacks directed at mobile devices

The Last Watchdog

Chris Clements, VP of Solutions Architecture, Cerberus Sentinel. Clearly, there was a failure somewhere, either human error or faulty technology or both. It’s incumbent upon us as consumers of technologies services to adopt a defense-in-depth posture. For T-Mobile, this is the sixth major breach since 2018.

Mobile 306
article thumbnail

RSA 2020 – See You There!

McAfee

With new technologies, strategies and AI being employed by both security pros and threat actors, one thing remains constant: us. This seminar will provide a full day of focus on emerging threats such as ransomware, targeted attacks, emerging IoT threats, and new aspects of social engineering and deep fake human manipulation.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. AI Use Danger As with any emerging technology, many organizations should expect errors and growing pains as teams learn the nuances of applying the technology.