Remove CSO Remove Information Security Remove Penetration Testing Remove Technology
article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said. “If It confirms that certificate holders are qualified for hands-on IT security roles by validating their understanding of information security.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Brian Krebs is an independent investigative reporter known for his coverage of technology, malware , data breaches , and cybercrime developments. Brian Krebs | @briankrebs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Today, c yber security incidents lead to significant damage, alarming organizations of all types and sizes in different geographic locations. The contemporary world has witnessed the rise of the Internet and global communication, and collaboration technologies, including mobile data use and the culture of bring your own device [BYOD].

article thumbnail

M&A Trending In Cybersecurity Industry Vertical For 2022

CyberSecurity Insiders

Even through the Covid19 pandemic, trends in acquisition and consolidation of information security oriented companies remained quite strong. According to CSO, 2021 shaped up to be an active year for mergers and acquisitions in the cybersecurity industry. Top cybersecurity M&A deals for 2021 | CSO Online.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

According to thought leaders, the compromise of video data could result in intellectual property theft, physical security threats, privacy violations, extortion and perhaps regulatory punishment. For example: passwords being typed or posted, specific motions or commands used to activate control systems to open or unlock doors, etc.”. “For

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

She has 15 years of experience, and yet she's not a CSO at any large organization, rather than curse her fate, she decided to help others, so that maybe they can become the CSOs, and just maybe start to address the diversity problem in InfoSec. In a moment we'll meet a woman who has four graduate degrees in it, plus an MBA.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

She has 15 years of experience, and yet she's not a CSO at any large organization, rather than curse her fate, she decided to help others, so that maybe they can become the CSOs, and just maybe start to address the diversity problem in InfoSec. In a moment we'll meet a woman who has four graduate degrees in it, plus an MBA.

Hacking 40