article thumbnail

Why would a lawyer ever need an Information Security Professional?

CyberSecurity Insiders

As an information security professional, have you often found yourself frustrated by the growing collection of cyber-based rules, guidance, regulations, and contemplations that our lawmakers can conjure up? It is also clear that information security professionals see things differently than most non-security people.

article thumbnail

What’s Your Fail-Safe Posture? Before You Learn How to Fly, Learn How to Fall

CyberSecurity Insiders

One of the recommendations in the report by Saltzer and Schroeder , “ The Protection of Information in Computer Systems ”, was to include “Fail-safe defaults”. If you work in any area of information security, it is time to consider what failing safely is all about. Read the Article. Want to Learn More About CISSP?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Evolving Identity: Why Legacy IAM May Not Be Fit for Purpose

CyberSecurity Insiders

As an information security professional, you are aware that identity management is a very important part of the security landscape. To the modern information security practitioner, it must do both at the same time. Quite often, the information security professional has experienced this frustration too.

Passwords 116
article thumbnail

Improving Business Outcomes With VRM

NopSec

Time and again, we hear from information security leaders who have invested in vulnerability risk management (VRM) technology and are now asking themselves whether the time, money, and resources put into VRM implementation are delivering on the promised value. Competing IT demands on your infosec team are getting in the way of VRM.

InfoSec 40
article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

But what might they offer the front-facing information security officer – someone with a ten-year plan, wondering what to prepare for down the line? The researchers presented Monday afternoon at the RSA Conference, to tease a soon-to-be-released whitepaper of their work. (Photo by Mario Tama/Getty Images).

article thumbnail

Learning Machine Learning Part 1: Introduction and Revoke-Obfuscation

Security Boulevard

That said, since I normally blog about information security related topics, I know I need to give a basic overview of what machine learning is and some of the essential concepts that are needed to understand the rest of the post. Also their blog post , whitepaper , Black Hat USA slides , BlackHat USA presentation on the subject.