article thumbnail

Kingston Technology Wins Coveted Global InfoSec Awards During RSA Conference 2021

CyberSecurity Insiders

a world leader in memory products and technology solutions, is proud to announce it has won the following Global InfoSec Awards for its encrypted USB solutions family from Cyber Defense Magazine (CDM), the industry’s leading electronic information magazine: Data Loss Prevention Market Leader. “We About CDM InfoSec Awards.

InfoSec 40
article thumbnail

Cyber CEO – Cyber Hygiene is More Critical for Your Business Now Than Ever Before – Here’s Why

Herjavec Group

No matter how many firewalls or network controls you have in place, the risk of insider threat will always be present. I’ve been in infosec for over 30 years and have had the great privilege of evolving and learning as a cybersecurity executive in a space I love.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

DeSouza has also earned numerous industry accolades, including Top Global CISO by Cyber Defense Magazine, Top 10 InfoSec Professional by OnCon, and induction into the CISO Hall of Fame by the global Cyber Startup Observatory.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

How to screen for natural infosec talent: Ask for a worst case scenario for any common situation. Street is an industry-respected speaker and analyst and currently is the VP of InfoSec for SphereNY. Markstedter actively contributes to filling the infosec education gap. Read more: Top IoT Security Solutions of 2021.

article thumbnail

Water utility CISO offers tips to stay secure as IT and OT converge

SC Magazine

Now we’re starting to see a convergence of these two into IoT, [although] traditionally the two groups never really worked a whole lot with each other,” said Sanders. Infosec professionals at the plant must worry about malicious actors potentially sabotaging OT systems using the connected IT systems as an initial vector of compromise.

CISO 82
article thumbnail

The Network Perimeter: This Time, It’s Personal

Threatpost

Botnets and IoT devices are forming a perfect storm for IT staff wrestling with WFH employee security.

IoT 80
article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

DXC Technology has over 40 years of infosec experience, most of which as HPE’s Enterprise Services. Services include tools for managing incident response, breaches, threats, and vulnerabilities, threat intelligence feeds, OT and IoT security, and cyber maturity reviews. Also Read: Top Next-Generation Firewall (NGFW) Vendors.