This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Communication skills: All the security knowledge in the world is useless if you can’t pass on information about policies, strategies, vulnerabilities, and security posture to other system users, from upper and executive management to sales and data entry clerks. The study pegs the worldwide active cybersecurity workforce at 5.5
Basic InfoSec Testing Standard, they revealed major issues in personal data collection, permission abuse, and data sharing. The public is advised to exercise caution when choosing mobile apps.” ” reads the NSB’s announcement. Using the v4.0 ” concludes the report.
Meanwhile, an informal Tenable poll looks at cloud security challenges. Cybersecurity News) How to mitigate buffer overflow vulnerabilities (Infosec Institute) How to prevent buffer overflow attacks (TechTarget) VIDEOS What is a Buffer Overflow Attack? Check out best practices for preventing buffer overflow attacks.
Gigabytes of sensitive data were exfiltrated, including customer payment card information (PCI), employee social security numbers (PII), and confidential financial documents. Because the stolen credentials had the necessary privileges, the attacker was able to decrypt the data at rest. What is DataPrivacy?
Still, the top response stood out clearlyprotecting dataprivacy. The thing is, secure communication goes beyond just protecting dataprivacy. It encompasses everything from ensuring the confidentiality and integrity of information to reducing risks, maintaining compliance, and building trust with customers.
The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel. In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts.
Join us as we explore the concept of smart cities—municipalities enhanced by connected technology like sensors, cameras, and automated systems to improve services and infrastructure.
Is there really a cybersecurity talent shortage, or are we just looking in all the wrong places? This week on the Shared Security Podcast, we tackle the buzz around the so-called cybersecurity skills gap.
In this episode, we discuss the latest issues with data brokers, focusing on a breach at Gravy Analytics that leaked 30 million location data points online. We also explore a vulnerability in Subarus Starlink system that allows unrestricted access to vehicle controls and customer data using just a last name and license plate number.
In this episode we welcome Kathleen Smith, CMO of ClearedJobs.net, to discuss the current state of the cybersecurity job market. Kathleen shares her extensive experience in the field, recounting her tenure in various cybersecurity events and her contributions to job market research and recruiting.
In this episode, we discuss the UK governments demand for Apple to create a secret backdoor for accessing encrypted iCloud backups under the Investigatory Powers Act and its potential global implications on privacy.
In this episode, we discuss the significant data breach at the Internet Archive, affecting 33 million users. We also examine the introduction of an AI-integrated toilet camera by Throne, designed for health monitoring by analyzing bodily waste, and the ensuing privacy concerns.
Join us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in Application Security, and the use of AI in security.
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation.
Travel back to 2009 with the second-ever episode featuring discussions on early Facebook bugs, cross-site scripting vulnerabilities, and a pivotal Canadian privacy ruling involving Facebook. Join hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast.
In the final episode of the Shared Security Podcast for 2024, join us as we recap our predictions for the year, discuss what we got right and wrong, and highlight our top episodes on YouTube. We also extend a heartfelt thank you to our Patreon supporters and special guests.
Regulatory compliance and dataprivacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. GDPR-style dataprivacy laws came to the U.S.
When working in non-production environments such as testing and development, it’s crucial to ensure that Personally Identifiable Information (PII) is adequately protected. These environments often replicate production systems but may lack the same security controls, making them vulnerable to data breaches.
They discuss the challenges within the cybersecurity industry, including the transition to cloud computing and the neglect […] The post Alyssa Miller: Charting the Course Through InfoSec and Aviation appeared first on Shared Security Podcast.
January 28th is DataPrivacy Day, an international effort to empower individuals and support businesses in the endeavor to respect privacy, safeguard data, and enable trust. This year, the National Cybersecurity Alliance has extended the dataprivacy campaign to be a week-long initiative.
He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, especially in regions without strict privacy laws like the United States. The post Understanding Privacy Changes: eBays AI Policy and The Future of DataPrivacy appeared first on Security Boulevard.
Obsidian Security is proud to be recognized as the Best SaaS/Cloud Security solution by Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine, during RSA Conference 2023. The post Obsidian Security Wins Top Honor At Global InfoSec Awards appeared first on Security Boulevard.
Under the proposed amendment , the onus is placed upon corporate boards and executive leadership to: Implement and maintain a written cybersecurity policy—approved annually—to protect information systems and nonpublic information stored on those systems. Have Infosec certifications and passion for #cyber and #dataprivacy.
Bill Bowman, CISSP, CIPM, is the Chief Information Security Officer & DataPrivacy Officer at financial software company Emburse. A : When I was with Bright Horizons, many top-tier clients demanded InfoSec competence. He serves on the Advisory Council for SecureWorld Boston and has spoken on our conference agendas.
Cybersecurity Awareness Month is a fixture of the calendar now, as are DataPrivacy Day, World Password Day, and a host of other well-intentioned privacy and security themed events. A lot of it is the same basic information you see on mainstream news reports, or blogs. The questions is, is anybody listening? Winding down.
It was fitting that the opening keynote panel for SecureWorld Chicago on June 8th was titled " Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec Landscape. Well, information security, cybersecurity happens to be a critical part of the business, being able to achieve strategic objectives. "You
With 90% of the data risk surface in pre-production, it’s all too easy for an insecure dataset to slide out, so data must be made safe before it is copied to non-production environments. Assure data compliance. Find and protect sensitive data and personally identifiable information.
She also spoke to the broader consequences of staff shortages and how this may affect the global cybersecurity workforce gap. And two vendor panels: There's a Bad Moon On the Rise – Are You Ready? The next opportunity to catch a SecureWorld event is SecureWorld Boston , taking place at the Hynes Convention Center on March 22-23.
Editor’s note: this piece was updated with fresh information in August 2021. Do you know where your most sensitive data is? Hopefully, your infosec management team is sleeping peacefully at this hour because your. The post Data Classification Policy: Definition, Examples, & Free Template appeared first on Hyperproof.
Ultimately, he believes “this is good for businesses as, through the insurance process, they will gain better visibility into their cyber risks and measures they can deploy to keep digital operations secure and compliant to dataprivacy regulations.”. billion in premium. But much will rely on regulation.
CyberSecAsia Readers Choice Awards In a major triumph for our APAC team, Thales won the CyberSecAsia Readers Choice Award in the DataPrivacy and Protection and Application Security categories. Global Infosec Awards At the 2024 RSA Conference, Imperva nabbed an astounding eleven Cyber Defense Magazine Global InfoSec Awards.
As I immersed myself in foreign concepts around the information security industry, marketing, and business practices at scale, I grew to appreciate not just the technology we were building at Duo, but the people who built it, the diverse audiences that we addressed, and the unique problems-to-solve around security at large.
In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million Americans, including hosts Tom and Kevin.
Repetition can lead people to over-disclose information, that could then put them at risk of identity theft and cybercrime. First published in the Journal of Cybersecurity , the research aims to understand the ‘privacy paradox’, where people share information without protecting it from others who don’t need to see it.
In the words of Duo Security’s Head of Advisory CISOs Wendy Nather, “This is not a marketing report to toss in your swag bag and ignore …this report will change how we think about running infosec programs.” DataPrivacy Day with a difference. MORE Fines against banks for data breaches more than doubled last year.
A new bipartisan privacy bill, the American DataPrivacy and Protection Act, “could” be the first privacy legislation in the US not doomed to fail, a story about why you should delete your location and private data in your car’s navigation system before selling it, and details on Firefox’s new privacy feature called “Total Cookie […].
CyberSecAsia Readers Choice Awards In a major triumph for our APAC team, Thales won the CyberSecAsia Readers Choice Award in the DataPrivacy and Protection and Application Security categories. Global Infosec Awards At the 2024 RSA Conference, Imperva nabbed an astounding eleven Cyber Defense Magazine Global InfoSec Awards.
In recent court testimony two Facebook engineers were asked what information, precisely, does Facebook store about us, and where is it? Surprisingly they said, they don’t know.
Yesterday I proposed a guideline on the information risk, security and privacy aspects of professional services. Contracting is an important control in its own right with significant information and commercial risks associated. Today, I'm exploring the preliminary phase. Is there a cultural fit, here, or a misfit?
Episode 324 features discussions on a significant AT&T data breach affecting 73 million customers and a sophisticated thread jacking attack targeting a journalist.
In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the companys potential collapse and lack of federal protections for your personal information.
In this episode, host Tom Eston shares the three key lessons he’s learned over his 18-year career in cybersecurity: effective communication, continuous learning, and empathy.
Learn essential tips on smartphone security and how to protect your personal information, especially when attending protests. Scott Wright joins the discussion to provide valuable insights on safeguarding your data. [] The post US Border Searches and Protesting in the Surveillance Age appeared first on Shared Security Podcast.
The conversation covers the challenges of maintaining reliable information in social media and the [] The post Meta Ditches Fact-Checking for Community Notes, RedNote and the TikTok Ban appeared first on Shared Security Podcast. We also discuss the implications of a TikTok ban in the U.S., with users migrating to similar apps like RedNote.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content