article thumbnail

Inflation Is Making Cybersecurity Even More Challenging for Leaders

SecureWorld News

Economic effects, including inflationary pressures, have had a broad impact across the InfoSec landscape," Smeaton said. Reanna Schultz is a cybersecurity professional and frequent SecureWorld speaker whose day job is as Team Leader of InfoSec at Garmin. Does this tool integrate with our existing architecture (e.g., SIEM, SOAR)?

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

His expertise is in social engineering, technology, security algorithms and business. David Poe is the vice president of data architecture and shared solutions for United Way Worldwide. Daniel Lieber is the president of Innovative Ideas Unlimited, with 25 years of experience in advanced computing security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber CEO: A Look Back at Cybersecurity in 2021

Herjavec Group

Threat actors have developed social engineering approaches that leverage the uncertainty and chaos of the pandemic in order to deliver their malicious software. This makes simple but essential information security protocols like proper monitoring, network segmentation, and working toward a zero-trust architecture challenging.

article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

In information security (infosec) there is the need to be on the latest version. Writing exploits or developing infosec tools is no exception, they often need to have access to the latest libraries. ARM - multi architecture Since BackTrack 4, the option was there for ARM support. This helps make the system more robust.

InfoSec 52
article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Ricardo Villadiego, founder & CEO of Lumu , expects “a significant shift towards adopting models based on passwordless architectures like Google Passkeys as the dominant authentication method to combat phishing and scam campaigns.

article thumbnail

Embracing Automation in Cyber Threat Intelligence: The Key to Timely Protection

SecureWorld News

This ranges from understanding cryptography to having insights into operating system architecture. And if a threat actor employs social engineering , the analyst might even need a basic grasp of psychology. Highlighting the AI advantages in ITSM and InfoSec, you can use ChatGPT.