article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. Implementing a robust third-party risk management policy and fostering collaboration with other functions for a shared strategy is vital.

article thumbnail

Episode 162: Have We missed Electric Grid Cyber Attacks for Years? Also: Breaking Bad Security Habits

The Security Ledger

» Related Stories Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Episode 159: Deep Fakes and Election (in)Security with ZeroFOX Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy. If you believe the headlines, the first known disruptive cyber attack against the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Herjavec Group is Recognized by Cyber Defence Black Unicorn Awards

Herjavec Group

He founded Herjavec Group, in 2003, introducing the first managed firewall in the Canadian Market. He is a trusted cybersecurity advisor for the Government of Canada, was a panelist on the recent White House Summit on Cybersecurity, is a cyber expert featured on CNN, CNBC, ABC, and BNN, and is Google’s Most Searched Person in Cybersecurity.

InfoSec 52
article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. DXC Technology has over 40 years of infosec experience, most of which as HPE’s Enterprise Services. DXC Technology. SafeBreach.