This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
It is also a celebration of Canadian thought leadership on very important business and technology topics that are directly impacting Canadians quality of life as well as their pocketbooks." Retail: Supply chain vulnerabilities contribute to $7.05 Key findings: the cyber threat landscape in 2025 1. million in average breach costs.
The bigger risk is a skills gap, as security professionals must now understand both traditional threats and AI-driven technologies. "AI George Wang , CMO, Peterson Technology Partners, will present on "The Impact of AI on Cybersecurity Roles, Retention, and Culture" at the SecureWorld Chicago conferences on May 21st.
I have a CISO peer who calls himself a 'compulsive interviewer' where he finds himself talking to wait staff, bartenders, retail workers, hospitality workers, those who show unique problem solving skillsworking under pressure or applying pattern matching to anticipate a problem and fixing it before it appears.
As the global leader in Managed Security Services, Herjavec Group has demonstrated the innate ability to combine the power of technology, AI, and automation with human intelligence to optimize the IT security monitoring, incident detection, and incident response times of enterprises globally. HG Mana ged Detection & Response (MDR) .
I seem to be doing most of that activity now on Mastodon , which appears to have absorbed most of the infosec refugees from Twitter, and in any case is proving to be a far more useful, civil and constructive place to post such things. For a variety of reasons, I will no longer be sharing these updates on Twitter.
A : I have worked in information technology (IT) and networking for more than 20 years in the retail, distribution, and legal industries. My goals in InfoSec are similar: to teach the organization how to protect itself. A : Reconnecting with the Philadelphia InfoSec community. A : I enjoy an outdoor adventure/journey.
With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. John Bruggeman is chief technology officer at Hebrew Union College – Jewish Institute of Religion.
By Jordan Durham I was recently reading an article which made a brief analogy between cybersecurity and a retail store. So, let’s consider a supermarket as if it were a well-known and respected enterprise with information technology (IT) capabilities and a cybersecurity program, what does the supermarket look like then?
At the same time, Amazon, Apple, and Google have set a new pace of innovation and provide technology platforms for nimble fintechs and startups to follow suit. . At the centre of his operation, one team rationalizes and secures retail and corporate payments data to keep BNPP’s instant payment innovation program and rollout on track.
Related Stories Spotlight: Is There A Cure For InfoSec’s Headcount Headache? While exact numbers are hard to come by, large scale studies of companies found that more than a third had been hit by ransomware in the past year, with the retail, government and education sectors particularly hard hit. Read the whole entry. »
Every so often, a technology comes along that seems to perfectly capture the zeitgeist : representing all that is both promising and troubling about the future. The technology is poised to change just about everything else …at least eventually. When it comes to what can you do today?
Every so often, a technology comes along that seems to perfectly capture the zeitgeist: representing all that is both promising and troubling about the future. The technology is poised to change just about everything else …at least eventually.
It combines the power of technology, AI, and automation with human intelligence to optimize the IT security monitoring, incident detection, and incident response times of enterprises globally. Along with these contributions, Robert is active in a number of impactful infosec initiatives. Connect with Robert. Connect with Adam.
Every so often, a technology comes along that seems to perfectly capture the zeitgeist : representing all that is both promising and troubling about the future. The technology is poised to change just about everything else …at least eventually. When it comes to what can you do today?
Every so often, a technology comes along that seems to perfectly capture the zeitgeist : representing all that is both promising and troubling about the future. The technology is poised to change just about everything else …at least eventually. When it comes to what can you do today?
In Digital Guardian’s Debra Danielson and Connie Stack, chief technology officer and chief strategy officer respectively, you have two very different, but equally inspiring career evolutions. Danielson: Yes, doing technology assessment of potential acquisitions. Granted, neither went to work with much interest in computers.
The retail giant grew sales by a whopping $15 billion in 2020. But had the company not begun a technology transformation years prior, the surge in demand combined with the security ramifications could have been a disaster. In a world where infosec talent is hard to come by, that’s valuable,” she said.
R is for Real-Time Risk Improved real-time risk monitoring and identification capabilities using modern technologies, including alerts and notifications, allow faster response to a dynamic threat landscape. Using powerful data analytics, HighBond gives users in-depth insights without technological experience.
What role does technology play in facilitating intimate partner abuse? They discuss how software and IoT companies can avoid becoming the next Black Mirror episode and share resources that can help survivors (and those who want to help them) deal with the technology issues that can be associated with technologically facilitated abuse.
This nonstop barrage of security crises has made certain infosec leaders and practitioners more aware than ever of the job’s impact on mental healthy, and the importance to protect against stress, exhaustion and burnout. But how have they been managing? But you don’t have to be a member of a formal group.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content