Remove Information Security Remove InfoSec Remove Social Engineering Remove Technology
article thumbnail

Alyssa Miller: Charting the Course Through InfoSec and Aviation

Security Boulevard

In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey in aviation and being a pilot.

InfoSec 69
article thumbnail

Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data

Security Boulevard

The Tim Hortons mobile app created a “a mass invasion of Canadians’ privacy” by conducting continuous location tracking without user consent even when the app was closed, what is a social engineering kill-chain and how can this help understand and prevent attacks, and new research shows 33 out of the top 100 hospitals in America […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones

Security Boulevard

The post DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones appeared first on The Shared Security Show.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Brian Levine is senior director of product security at Axway, a global security engineering organization delivering training, tools, processes and DevSecOps practices for secure applications and cloud services to the enterprise market. She also served as the deputy chief information officer of the White House.

article thumbnail

AI in Cybersecurity: How to Cut Through the Overhype and Maximize the Potential

CyberSecurity Insiders

Of the 13 engineers who commented for this publication, none felt that the marketing associated with the products they were working on was completely accurate with respect to advertised capabilities. The paper explores those areas as well as malicious uses of ML and DL, specifically in social engineering and phishing.

article thumbnail

Can a 60-year-old framework still improve cyber efficiency?

SC Magazine

While being “classic” and “timeless” might work in other industries, information security (Infosec) must constantly guard against resting on laurels when it comes to strategies and solutions. The question is whether the concept is still relevant, or if a new one is needed that better matches today’s technological capabilities.

article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

5G is among the technologies that researchers predict will have a big impact on the security landscape in the next decade. But what might they offer the front-facing information security officer – someone with a ten-year plan, wondering what to prepare for down the line? AI could impact more than just social engineering.