Remove Education Remove Information Security Remove InfoSec Remove Social Engineering
article thumbnail

Social Engineering and Healthcare

Security Through Education

Social engineering has become a larger threat to the healthcare industry in recent years. Clearly, we need to take notice of how social engineering attacks are targeting our vital healthcare systems. So, what exactly is social engineering? What is Social Engineering? In one case, $3.1

article thumbnail

Shortage of Information Security Professionals

Security Boulevard

As data breaches at corporations, educational institutions, and government agencies continue to grow, so does the need. The post Shortage of Information Security Professionals appeared first on Security Boulevard. In recent years, there has been an exponential increase in high-profile data breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BSides Vancouver 2021 – Savannah Lazzara’s ‘Social Engineering: Tactics And Techniques’

Security Boulevard

The post BSides Vancouver 2021 – Savannah Lazzara’s ‘Social Engineering: Tactics And Techniques’ appeared first on Security Boulevard. Our thanks to BSides Vancouver for publishing their outstanding BSides Vancouver 2021 Conference videos on the groups' YouTube channel.

article thumbnail

BSidesAugusta 2021 – Timothy De Block’s ‘Social Engineering The Development Team For Better Security’

Security Boulevard

The post BSidesAugusta 2021 – Timothy De Block’s ‘Social Engineering The Development Team For Better Security’ appeared first on Security Boulevard. Many thanks to BSidesAugusta for publishing their outstanding videos from the BSidesAugusta 2021 Conference on the organization’s YouTube channel.

article thumbnail

Introducing Behavioral Information Security

The Falcon's View

Suddenly, it occurred to me, "Hey, you know what we really need is a new sub-field that combines all aspects of security behavior design, such as security awareness, anti-phishing, social engineering, and even UEBA." Well, low-and-behold, it already exists! release, expected sometime soon).

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Fifteen years after the launch of the microblogging social media platform, Twitter remains a dominant public forum for instant communication with individuals and organizations worldwide on a universe of topics, including #cybersecurity. How to screen for natural infosec talent: Ask for a worst case scenario for any common situation.

article thumbnail

AI in Cybersecurity: How to Cut Through the Overhype and Maximize the Potential

CyberSecurity Insiders

ISACA’s new publication, AI Uses in Blue Team Security , looks at AI, ML and DL applications in cybersecurity to determine what is working, what is not, what looks encouraging for the future and what may be more hype than substance. AI Uses in Blue Team Security is available as a free download at www.isaca.org/ai-blue-team-security.