Remove Big data Remove CISO Remove Internet Remove Technology
article thumbnail

Recap: Black Hat USA 2021

Veracode Security

In addition to hosting a Cards and Coding virtual casino night to discuss the future of cybersecurity (and give away some prizes), we held a Lunch & Learn with Wallace Dalrymple, CISO of Emerging Markets at Advantasure. If you missed the Lunch & Learn, you can read Advantasure’s full story here to see how they got it done.

article thumbnail

Healthcare Cyberattacks Lead to Increased Mortality, Lower Patient Care: Ponemon Study

eSecurity Planet

Ponemon chairman and founder Larry Ponemon said in a statement that “Most of the IT and security professionals regard their organizations as vulnerable to these attacks,” and that growing adoption of technologies such as cloud, mobile , big data , and the Internet of Things (IoT) are adding to that risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: For better or worse, machine-to-machine code connections now form much of the castle wall

The Last Watchdog

The explosion in the number of human and non-human identities in the public cloud has become a security risk that businesses simply can’t ignore,” observes Eric Kedrosky, CISO at Sonrai Security. And the solution seems obvious: Big Data. I’ve had a couple of deep discussions with Kedrosky about this. Rise of agile software.

Software 200
article thumbnail

Recap: Black Hat USA 2021

Security Boulevard

In addition to hosting a Cards and Coding virtual casino night to discuss the future of cybersecurity (and give away some prizes), we held a Lunch & Learn with Wallace Dalrymple, CISO of Emerging Markets at Advantasure. From Big Data to Open Source.

article thumbnail

Federal cybersecurity: breaking down the barriers to adoption

Thales Cloud Protection & Licensing

These vulnerabilities can span from limited use of data encryption to the abuse of privileged user policies. However, modernization and transformative technologies are creating new vulnerabilities resulting in data breaches. Furthermore, over 80% of agencies feel they are already vulnerable to a data breach.

article thumbnail

3 Things Leaders Often Miss When Trying to Get More Women into Tech

Jane Frankland

Most people know that technology creates more jobs than any other industry and that digital is the golden thread that runs across all industries. According to the World Economic Forum, at least 133 million new roles are set to emerge globally in the next year as a result of the new division of labour between human ingenuity and technology.

article thumbnail

Holes in Linux Kernel Could Pose Problems for Red Hat, Ubuntu, Other Distros

eSecurity Planet

Dirk Schrader, global vice president of security research at change management software provider New Net Technologies, told eSecurity Planet that while the vulnerabilities likely won’t be part of malware campaigns, they have a “severe potential when used in a coordinated and targeted attack scenario. Severe Potential’.