This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
CSO Magazine recently recognized eMAPT among the Top 16 OffSec, pen-testing, and ethical hacking certifications for 2025 , noting that the eMAPT certifications “offer hands-on training and up-to-date curricula, equipping offensive security professionals with their choice of specialized or broad skill credentialing.”
SAN FRANCISCO The cybersecurity industry showed up here in force last week: 44,000 attendees, 730 speakers, 650 exhibitors and 400 members of the media flooding Moscone Convention Center in the City by the Bay. Jay” Abdullah , Mastercards Deputy CSO who gave a keynote address at The CSA Summit from Cloud Security Alliance at RSAC 2025.
Cybersecurity is on the brink of significant transformation as we approach 2025, grappling with escalating complexities driven by advancements in technology, increasing geopolitical tensions, and the rapid adoption of AI and IoT. Ethics The ethical challenges posed by advancing AI technologies will demand urgent attention in 2025.
All the firewalls in the world can’t help you if an attacker removes your storage media from the storage room. Get the latest from CSO by signing up for our newsletters. ]. Learn what you need to know about defending critical infrastructure. |
Check out these 11 phishing prevention tips for best technology practices, employee education and social media smarts. | Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here
Case in point: A federal judge recently ordered Uber Technologies to work with its former CSO, Joseph Sullivan (who held the position from April 2015 to November 2017), and review a plethora of Uber documents that Sullivan has requested in unredacted form for use in his defense in the upcoming criminal trial.
Dan Meacham is chief information security officer and CSO with Legendary Entertainment, the production company behind Godzilla vs. Kong and other popular films such as The Dark Knight and Jurassic World. I cannot do zero trust at all,” Meacham told SC Media. Here, he hang out in the voiceover studio. Legendary Entertainment).
The media paid close attention to ransomware attacks last year, as they had a significant impact on Colonial Pipeline, the nation’s largest fuel distributor, and JBS, the nation’s largest meat distributor. I think you may have heard of it, isn’t the news full of it? Related: Make it costly for cybercriminals. Food for thought, eh!
Nor can technology alone solve the security challenges facing the user community. Joining SC Media Deputy Editor Bradley Barth for the discussion is Dan Meacham, chief information security officer and CSO at Legendary Entertainment, and Hossein Ghazizadeh, chief services officer at Barracuda Networks.
Social Security numbers, mailing or email address, and phone numbers have most commonly been considered PII, but technology has expanded the scope of PII considerably. It can include an IP address, login IDs, social media posts, or digital images. Geolocation, biometric, and behavioral data can also be classified as PII.
Internet of Things (IoT), industrial control systems, operational technology has made securing connected devices more challenging as the entry points on networks have increased tremendously and introduced more opportunities for vulnerabilities with insecure communication protocols and configurations. James Carder, LogRhythm CSO.
Security endpoint protection vendor Webroot has filed a patent infringement complaint against competitor Trend Micro accusing it of implementing patented technology in its security software and systems without authorization. The complaint has raised eyebrows within the sector and on social media.
We post our daily lives to social media and think nothing of making key details about our lives public. The first few days on the job can be hectic, with a lot of new technology to deal with. We need to reconsider what we share online and how attackers can use this information to target businesses.
These campaigns leverage various methods and technologies to erode trust, increase polarization, and threaten democratic processes. Skilled Advanced Persistent Manipulator actors use traditional media with internet and social media to vastly increase the scope, scale, and efficiency of their campaigns.
Kindly share on social media to raise awareness for the empowerment and accomplishments of women in technology. Together, Debby and Tyler shared valuable insights and advice. Watch this beneficial conversation between two great professionals in tech and cybersecurity. To read this article in full, please click here
In reality, it was an April fool’s prank with MITRE’s social media team cranking out funny answers in the guise of a chatbot. Like many, I see the potential for AI to help bring about positive change, but also its potential as a threat vector. To some, recent AI developments are a laughing matter.
The cloud-based mobile product is aimed at identifying phishing attacks on mobile devices in real time, as a user clicks on a malicious link, using computer vision technology. To read this article in full, please click here
Customer Perspectives A petroleum distribution business developed innovative ideas for increasing customer loyalty, but it needed to upgrade its technology infrastructure to bring those concepts to life. Another opportunity lay hidden in the service stations’ snack and drink sales.
As security leaders, driving a security program at scale means myriad things: Protect systems, enable people, help meet revenue goals, accelerate delivery, help the CIO team deploy new technologies, enable data patterns, assess privacy, enable new vendors and system interconnections, and more. To read this article in full, please click here
They target multiple industries simultaneously, including manufacturing, financial services, technology, retail, healthcare, energy, and media." To read this article in full, please click here
While there is currently no uniformity between regulations from country to country, the majority are based on frameworks from entities like the National Institute of Standards and Technology (NIST) and International Organization for Standardization (ISO). James Carder, CSO, LogRhythm. In March 2021, President Biden signed the $1.9
Judge and Golloway told SC Media in a joint interview that while many high-tech and cybersecurity leaders like Microsoft, Google, Trend Micro, Comcast and AT&T have historically been big givers to cyber nonprofits, everyone is competing for the same funds, and there is only so much to go around. “One
To carry out the alleged heist, the employee didn’t even use the type of sophisticated technology that you might expect. Our own data shows this type of exfiltration is shockingly common with removable media still accounting for 42% of data exfiltration as of March 2021.
By Amanda Fennell, CSO and CIO, Relativity. Mobile devices and social media, among other forces, have advanced a kind of rapid and fragmented consumption of information that’s influenced the way we all operate. Amanda joined the Relativity team in 2018 as CSO and her responsibilities expanded to include the role of CIO in 2021.
With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. John Bruggeman is chief technology officer at Hebrew Union College – Jewish Institute of Religion.
Because of social media, it’s not too difficult to follow you around. You probably post most of your daily activities on your social media profile. Today, modern technology has made it much easier for hackers and other cybercriminals to hide their tracks. They do this by following you on the internet.
Sonatype’s world-class open source intelligence, which includes our automated malware detection technology, safeguards your developers, customers, and software supply chains from infections like these. Ax’s expertise lies in security vulnerability research, reverse engineering, and software development.
Making matters worse, the cameras employ facial recognition technology, which leads to questions as to whether an attacker could actually identify individuals caught on camera and then pursue them as targets for social engineering schemes or something even more nefarious. “For Look at the Mac operating system.
It also cites the emergence of recent technologies, and the proliferation of criminal groups, as issues increasing pressure on staff. Given the evolving nature of the threat landscape, keeping up with newer security technologies and best practices can also be mentally exhausting.
In its press release, Austin, Texas-based SolarWinds notes that Brown has “25 years of experience developing and implementing security technology” and “holds 18 issued patents on security-related topics.” SC Media reached out to SolarWinds for an interview with Brown.) Only my paycheck.”. Tim Brown, SolarWinds’ new CISO.
Legendary Entertainment is a global media company with multiple divisions including film, television, digital studios, and comics. Under the guidance of Dan Meacham, VP of Global Security and Corporate Operations and CSO/CISO, the multi-billion dollar organization transitioned from on-premises data centers to the cloud in 2012.
It could be your IT systems, your operation technology, your IoT, your industrial control systems, or SCADA environments.". Jason Miller, CSO of Paper Excellence, tackled an interesting topic in "Physical and Digital Cyber Defense: Building Culture and Collaboration." It's all about forcing people to think on their feet, Collins said.
The contemporary world has witnessed the rise of the Internet and global communication, and collaboration technologies, including mobile data use and the culture of bring your own device [BYOD]. Today, c yber security incidents lead to significant damage, alarming organizations of all types and sizes in different geographic locations.
She has 15 years of experience, and yet she's not a CSO at any large organization, rather than curse her fate, she decided to help others, so that maybe they can become the CSOs, and just maybe start to address the diversity problem in InfoSec. You see how it's been portrayed in the media, and it's just not right.
She has 15 years of experience, and yet she's not a CSO at any large organization, rather than curse her fate, she decided to help others, so that maybe they can become the CSOs, and just maybe start to address the diversity problem in InfoSec. You see how it's been portrayed in the media, and it's just not right.
????????Fifteen years after the launch of the microblogging social media platform, Twitter remains a dominant public forum for instant communication with individuals and organizations worldwide on a universe of topics, including #cybersecurity. Brian Krebs | @briankrebs. Denial-of-Suez attack. Jack Daniel | @jack_daniel.
According to PwC, more than half (55%) of technology and security executives plan to increase security budgets in 2021. A survey from Enterprise Technology Research (ETR) revealed that IT decision-makers expect permanent remote work to double in 2021. James Carder, LogRhythm CSO.
operations of its popular social media app in the coming weeks following threats of a shutdown by the Trump administration. Cloutier, who after joining the company dismissed the notion that TikTok shared any data with governments, was left with a significant challenge: overcome technological hurdles, while also regaining the trust of users.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content