article thumbnail

Top VAPT Testing Companies

Security Boulevard

Introduction By reducing information risks and vulnerabilities, a process called information security, also referred to as infosec, protects electronic data. Data can be stored in text, picture, or video file formats on servers, desktop computers, laptops, or mobile devices. InfoSec […].

article thumbnail

Information risk and security for professional services

Notice Bored

When you acquire or provide professional services, how do you address the associated information risks? In theory, clients and providers should proactively identify, evaluate and address information risks relating to or arising from professional services in order to avoid, reduce or limit the damage arising from such incidents.

Risk 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 144: Infosec Supporting Right to Repair with Joe Grand and Kyle Wiens

The Security Ledger

The post Episode 144: Infosec Supporting Right to Repair with Joe Grand and Kyle Wiens appeared first on The Security Ledger. Households Introducing Securepairs.org: Fighting Infosec FUD for the Right to Repair. A concerted lobbying effort by major technology, heavy equipment, telecommunications and electronics firms, that’s what.

InfoSec 40
article thumbnail

Episode 208: Getting Serious about Hardware Supply Chains with Goldman Sachs’ Michael Mattioli

The Security Ledger

In this week’s Security Ledger Podcast, sponsored by Trusted Computing Group, we’re talking about securing the hardware supply chain. And: Automating Our Way Out of PKI Chaos Encore Edition: Veracode CEO Sam King on Infosec’s Leaky Talent Pipeline. When we think about cyber threats to the hardware supply chain, we.

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

Advances in the use of polymers revolutionized everything from food packaging to electronics, telecommunication and medicine. For their latest Security Ledger Spotlight podcast, Paul Roberts sat down with David Brumley, Chief Executive Officer at ForAllSecure and a professor of Computer Science at Carnegie Mellon University.

InfoSec 52
article thumbnail

Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec

The Security Ledger

. » Related Stories Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy Episode 159: Deep Fakes and Election (in)Security with ZeroFOX Episode 160 Right to Repair’s Summer of Love – Sort of. ” McGuire was on to something : the use of plastic did indeed mushroom in the decades that followed.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Cedric Leighton is founder and president of Cedric Leighton Associates, a strategic risk and leadership management consultancy. Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Leighton is also a founding partner of CYFORIX, specializing in the field of cyber risk.