Remove whats-the-difference-between-it-and-cybersecurity
article thumbnail

Breaking Barriers, Building Bridges: Cultivating Female Belonging in the Cybersecurity Landscape

Jane Frankland

I knew it was a crazy act, and perhaps it was unfair of me to subject him to it, but I wanted him to understand a pressing need in cybersecurity. My intention was to physically manifest the dire state of gender diversity for cybersecurity; to make him truly feel the weight of it all. It’s declined.

article thumbnail

Choosing an MDR provider: Boutique or Big Brand (Part 3)

Jane Frankland

In last week’s blog (part 2), I continued to explore the pros and cons of using an MDR provider and whether it’s better choosing a boutique provider over that of a traditional big brand. Countless studies have shown that women and men gauge risk differently. For example, Byrnes et al. by Christine R.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Here is Erin’s Q&A column, which originally went live on OneRep’s well-done blog.) What drew you to this field?

article thumbnail

Key Insights from the OpenText 2024 Threat Perspective

Webroot

Here’s what you need to know: The Resilience of Ransomware Ransomware remains a formidable adversary, with groups like LockBit demonstrating an uncanny ability to bounce back even after significant law enforcement actions. Consumers should also take measures like frequently backing up their data to an external drive or cloud solution.

article thumbnail

Who Else Wants to Enjoy a Cybersecurity Conference?

Jane Frankland

Over the years I’ve attended hundreds of cybersecurity conferences all over the world, and participated as an attendee, speaker, chair, and advisor. All these roles have enabled me to gain an understanding of conferences through different lenses. Attending conferences can be an enriching experience for women in cybersecurity.

article thumbnail

Cybersecurity Awareness Month Blog Series: It’s Cybersecurity Awareness Month – advice to SMBs

Thales Cloud Protection & Licensing

This October marks the 15 th year of Cybersecurity Awareness Month. While we in the industry know that cybersecurity is a 365 day a year commitment, I’m happy to use October as the platform to remind small and medium sized businesses (SMBs) what they could and should be doing to keep their company, employees and customer data safe.

article thumbnail

Snowden Ten Years Later

Schneier on Security

Now, ten years later, I offer this as a time capsule of what those early months of Snowden were like. In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. But I had a more personal involvement as well. I wrote the essay below in September 2013.