article thumbnail

Thinking About the Future of InfoSec (v2022)

Daniel Miessler

The ideas will cover multiple aspects of InfoSec, from organizational structure to technology. At the highest level, I think the big change to InfoSec will be a loss of magic compared to now. HT to Jeremiah Grossman to also being very early to seeing the role of insurance in InfoSec. Org Structure. Technology. Regulation.

InfoSec 180
article thumbnail

The Clock To Q-Day Is Ticking: InfoSec Global and Thales Provide Collaborative Path to Quantum Readiness

Thales Cloud Protection & Licensing

To counter HNDL, migrating critical systems to Post-Quantum Cryptography (PQC) provides encryption and authentication methods resistant to an attack from a cryptographically relevant quantum computer (CRQC).

InfoSec 71
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Herjavec Group Wins 4 Cyber Defense Magazine Global InfoSec Awards

Herjavec Group

For this recognition, Cyber Defense Magazine (CDM) reviews the hottest, most innovative, market-leading cybersecurity players globally, recognizing the top one hundred firms worldwide. . Market Leader in Managed Security Service Provider (MSSP). Market Leader in IAM (Identity & Access Management) Service. Operate ?-

InfoSec 52
article thumbnail

The CPRA: What You Should Know as an InfoSec Professional

SecureWorld News

That data then goes through marketing and other avenues within the business, so how does the business track all the movement of that data, and when it comes to deleting that data (especially if the customer requests them to do so), how does the business ensure complete deletion of that data occurs? Training for employees (awareness).

InfoSec 74
article thumbnail

OAuth: Your Guide to Industry Authorization and Authentication

eSecurity Planet

Nearly a decade ago, the cyber industry was toiling over how to enable access for users between applications and grant access to specific information about the user for authentication and authorization purposes. and authentication-focused OpenID Connect (OIDC). Also Read: Passwordless Authentication 101. Not visible to user.

article thumbnail

Choose Your Own Adventure game animates security awareness training

SC Magazine

Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of social engineering. One of our jobs is to make sure the brand stays true to its zeitgeist, its character, and [Infosec] really had it down right from the beginning.”. What do you do?

article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

Threat actors have dramatically escalated their attacks – targeting security controls like multi-factor authentication (MFA), conducting wily social engineering attacks and extorting businesses large and small with ransomware. Since then, teams have had years to adjust to this new reality, yet the attackers have as well. And I get it.