Remove CSO Remove Information Security Remove Penetration Testing Remove Social Engineering
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Fifteen years after the launch of the microblogging social media platform, Twitter remains a dominant public forum for instant communication with individuals and organizations worldwide on a universe of topics, including #cybersecurity. Read more: Top IT Asset Management Tools for Security. Jason Haddix | @JHaddix.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Social engineering attacks , including phishing, spam, and viruses introduced via clickable links within e-mail affected 80% of the banking institutions in 2016. Cloud security success and choosing the right investments is all about having a clear understanding of threat types and their resulting damages.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

Making matters worse, the cameras employ facial recognition technology, which leads to questions as to whether an attacker could actually identify individuals caught on camera and then pursue them as targets for social engineering schemes or something even more nefarious. When surveillance leads to spying.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

She has 15 years of experience, and yet she's not a CSO at any large organization, rather than curse her fate, she decided to help others, so that maybe they can become the CSOs, and just maybe start to address the diversity problem in InfoSec. In a moment we'll meet a woman who has four graduate degrees in it, plus an MBA.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

She has 15 years of experience, and yet she's not a CSO at any large organization, rather than curse her fate, she decided to help others, so that maybe they can become the CSOs, and just maybe start to address the diversity problem in InfoSec. In a moment we'll meet a woman who has four graduate degrees in it, plus an MBA.

Hacking 40