article thumbnail

CISO workshop slides

Notice Bored

A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.

CISO 63
article thumbnail

Empirical Evaluation of Secure Development Processes

Adam Shostack

Earlier this year, I helped to organize a workshop at Schloss Dagstuhl on Empirical Evaluation of Secure Development Processes. I’m also pleased to say that the workshop report is now available at [link]. This situation leaves developers and industry in a rather undesirable situation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nurturing Our Cyber Talent

IT Security Guru

Businesses and other organisations are being pushed both by customers and regulators to evidence how they are keeping their information secure. Consumers have increasing expectations of organisations that any information they provide will be kept safe and actively avoid organisations that have a history of breaches.

CISO 117
article thumbnail

Democratizing Threat Hunting: How to Make it Happen for Everyone

Cisco Security

In the report, we surveyed more than 4,800 IT, security and privacy professionals to find out what matters most in their security practice. Topics such as tech refresh, risk management, and incident response were examined from the perspective of a roadmap for success in an information security program for organizations of all sizes.

Risk 104
article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

ISO 27000 is a standard for information security and SOC is for maintaining consumer data integrity and security across several dimensions. Is your firm in compliance with the Payment Card Industry Data Security Standard (PCI DSS) to protect cardholder data during transactions?

Risk 105
article thumbnail

Herjavec Group Wins 4 Cyber Defense Magazine Global InfoSec Awards

Herjavec Group

Herjavec Group’s award-winning Identity Service offering is focused on transforming an organization’s access requirements into an information advantage – both on-premise and in the cloud. We are managed and published by and for ethical, honest, passionate information security professionals. About Cyber Defense Magazine .

InfoSec 52
article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

In information security (infosec) there is the need to be on the latest version. Being a system administrator, a patch could contain a security update to stop a vulnerability. ARM - multi architecture Since BackTrack 4, the option was there for ARM support. Moving to Rolling Overall, the feedback received for Kali 2.0

InfoSec 52