article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

5G is among the technologies that researchers predict will have a big impact on the security landscape in the next decade. The researchers presented Monday afternoon at the RSA Conference, to tease a soon-to-be-released whitepaper of their work. Photo by Mario Tama/Getty Images).

article thumbnail

Improving Business Outcomes With VRM

NopSec

Time and again, we hear from information security leaders who have invested in vulnerability risk management (VRM) technology and are now asking themselves whether the time, money, and resources put into VRM implementation are delivering on the promised value. Your technology isn’t a fit for your business. Why is that?

InfoSec 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Evolving Identity: Why Legacy IAM May Not Be Fit for Purpose

CyberSecurity Insiders

The InfoSec Perspective. With the emergence of cloud technologies, IAM has taken on new angle. To discover more about CISSP read our whitepaper, 9 Traits You Need to Succeed as a Cybersecurity Leader. As an information security professional, it is your job to manage the identity process for your organization. New Directions.

Passwords 116
article thumbnail

If Infosec Was a Supermarket Business

Security Boulevard

So, let’s consider a supermarket as if it were a well-known and respected enterprise with information technology (IT) capabilities and a cybersecurity program, what does the supermarket look like then? If supermarkets can apply this type of thinking and control, how does this align with infosec & cybersecurity?

InfoSec 52
article thumbnail

Learning Machine Learning Part 1: Introduction and Revoke-Obfuscation

Security Boulevard

Subvert X,” where X is a synthesis of unfamiliar technologies, is often tasked and required to complete assessment objectives. The presentation and whitepaper in particular did a great job of introducing machine learning to security professionals. Revoke-Obfuscation and this post stick purely to the obfuscation detection problem.