article thumbnail

Risks to Your Network from Insecure Code Signing Processes

Security Boulevard

Many InfoSec teams don’t have the visibility into what their software development teams are doing. However, InfoSec teams need to understand that significant risks exist around poor code signing hygiene. In years past, InfoSec may have been the central keeper of code signing. Read our free eBook! "> Off. UTM Medium.

Risk 98
article thumbnail

MY TAKE: Peerlyst shares infosec intel; recognizes Last Watchdog as a top cybersecurity influencer

The Last Watchdog

Started by infosec professionals, Peerlyst takes the characteristics of B2B communications we’ve become accustomed to on Twitter and LinkedIn and directs it toward cybersecurity. Sharing intelligence for the greater good is an essential component of making Internet-centric commerce as safe and as private as it needs to be.

InfoSec 37
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NBlog July 16 - tips on preparing successful proposals

Notice Bored

" The Winning Business Case : how to create a compelling conceptual, analytical and pitch model that your audience will love" is a free eBook from OCEG - more than 20,000 words of advice about generating and pitching a business case for investment in some sort of risk-based project or initiative.

Risk 52
article thumbnail

Mental Health & Burnout in Cybersecurity: Tips, Stories and Insights

Cisco Security

Here are some more insights from people in the infosec community on what works for them: Advice on How Security Pros Can Promote Their Mental Health. For even more expert tips, stories, and insights, download Cisco’s new eBook, “ Creating Safe Spaces: Leaders and Practitioners on Mental Health and Avoiding Burnout.”.

article thumbnail

Why Your Code Signing Policies Are Being Ignored

Security Boulevard

InfoSec teams are charged with securing the company’s information and data, including code signing credentials. One reason for this is that code signing is frequently performed and managed by developers, not InfoSec teams. Lack of InfoSec visibility into code signing activities. Read our free eBook! "> Off.

InfoSec 52
article thumbnail

11 Resources to Help You Get Started in the Cybersecurity Industry

Cisco Security

Clearly, infosec professionals are in hot demand. No two cybersecurity professionals have the same origins story, as we learned over the course of compiling our recent eBook, Diversity in Cybersecurity. Things improved in 2020 when (ISC)2 learned that 700,000 professionals had joined the industry. Even so, 3.12

article thumbnail

Software Supply Chain Attacks Surged In 2021

Security Boulevard

Download “ Code Signing Machine Identity Management for Dummies ” eBook and discover why cybercriminals target code signing machine identities and how effective management and secure processes keep yours safe. SolarWinds: Should Security Live in InfoSec or DevOps? Related Posts.