Remove Cyber Risk Remove InfoSec Remove IoT Remove Technology
article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. The recent Verkada incident serves as a stark reminder, emphasizing the pressing need for CISOs to prioritize integrated IoT security and privacy in their strategic considerations.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. DXC Technology. DXC Technology. SafeBreach holds multiple patents and awards for their BAS technology.

article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. Back then Paul was writing infosec stories for IDG and I was doing the same at ZDNet.

InfoSec 52
article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. Back then Paul was writing infosec stories for IDG and I was doing the same at ZDNet.

InfoSec 52