article thumbnail

New Opportunity: Join (ISC)² Regional Event Committees

CyberSecurity Insiders

As we expand our events in 2022, we look forward to offering increased opportunities for education and networking among cybersecurity professionals within their regions. To ensure that each event makes a significant impact with relevant content, (ISC)² is seeking interested volunteers to join event planning committees.

Education 108
article thumbnail

Weekly Update 125

Troy Hunt

But moving forward, it's Microsoft Ignite in Sydney next week and that should be a great event, plus I'm talking about Google's Password Checkup extension and the other credential stuffing list "collections" I keep getting asked about. Twilio is sponsoring my blog this week (they're talking about the PSD2 reg in the EU).

Passwords 172
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 42M Record kayo.moe Credential Stuffing Data

Troy Hunt

To be honest, if your personal security practices are up to scratch (password manager plus 2FA), this is a bit of a non-event. I made a commitment to HIBP subscribers to let them know when I see their data so here we are, even if it's not as immediately actionable as a data breach with a clearly identifiable source is.

Passwords 211
article thumbnail

Are you READY for (ISC)² Security Congress?

CyberSecurity Insiders

Last year was a first for (ISC)² Security Congress , as our conference took place entirely virtually. The COVID-19 pandemic forced nearly all events in 2020 to go virtual and we’re excited to take the experience from that event and use it to deliver an even better one for you this year.

article thumbnail

Top of Mind Security Insights from In-Person Interactions

Cisco Security

The past few months have been chockfull of conversations with security customers, partners, and industry leaders. After two years of virtual engagements, in-person events like our CISO Forum and Cisco Live as well as the industry’s RSA Conference underscore the power of face-to-face interactions.

article thumbnail

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The Last Watchdog

It appears the cam in question was unwittingly set up by an employee for personal security reasons. There are so many agent-based security approaches that attempt to interpret logs or systems events that can tell you what they think is going on in the environment. And the network is that polygraph, it just is.

article thumbnail

4 Key Themes from Black Hat USA 2024

NetSpi Executives

In cybersecurity, few events hold as much anticipation as Black Hat USA, where industry experts come together to discuss the latest trends and technologies. Consolidation of Security Solutions One of the major themes at Black Hat this year was the shift from point solutions to consolidated security platforms.