This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
5G is among the technologies that researchers predict will have a big impact on the security landscape in the next decade. But what might they offer the front-facing informationsecurity officer – someone with a ten-year plan, wondering what to prepare for down the line? Photo by Mario Tama/Getty Images).
As an informationsecurity professional, you are aware that identity management is a very important part of the security landscape. To the modern informationsecurity practitioner, it must do both at the same time. Quite often, the informationsecurity professional has experienced this frustration too.
Time and again, we hear from informationsecurity leaders who have invested in vulnerability risk management (VRM) technology and are now asking themselves whether the time, money, and resources put into VRM implementation are delivering on the promised value. Your technology isn’t a fit for your business. Why is that?
Can your organization's informationsecurity program become a market differentiator for your brand? This week, the company made a significant announcement about the 5G network it is rolling out, and that announcement focused on security. 4 steps to future-proof 5G security. Verizon must be betting that it is.
It’s a thrilling time to work in cybersecurity, but new technology and unprecedented opportunities also present us with extraordinary challenges. Apparently, an employee at Company X used an LLM to help them finish a whitepaper. The problem of malware, specifically its ever-shifting flavors, has been plaguing us for decades.
Schneier on Security Schneier on Security, curated by renowned security technologist Bruce Schneier, offers thought-provoking analysis and commentary on security trends, policy debates, and emerging threats. Schneier’s blog provides deep insights into the intersection of technology, security, and society.
Just like Hercules and the road of Virtue, Zero Trust is a path leading to better security. While NIST has developed a blueprint for Zero Trust - you can read about it in this whitepaper - which can serve as a great start for your journey, organizations need to understand that Zero Trust is above all a mindset. Treat it as a mindset.
One way to do this is to become certified to the ISO 27001 informationsecurity standard. It’s not a technology product or service but a way of demonstrating security by applying repeatable policies and documented procedures to manage risk. It is not limited to IT and is not a security checklist or risk analysis method.
However, having a strong technological base alone is insufficient: we needed to determine how to explain not only what we do, but why customers would benefit from the solution in a way that they cannot with the existing security layers. In the case of Minerva, the company developed a unique way of combating evasive malware.
As a sidenote on learning this subject matter: Many offensive security professionals often have to figure out a lot about very complex systems in a relatively short period of time during engagements. Subvert X,” where X is a synthesis of unfamiliar technologies, is often tasked and required to complete assessment objectives.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content