On the Road to Good Cloud Security: Are We There Yet?
Dark Reading
MARCH 22, 2021
Misconfigured infrastructure is IT pros' top cloud security concern, but they're conflicted on how to address it in practice.
Dark Reading
MARCH 22, 2021
Misconfigured infrastructure is IT pros' top cloud security concern, but they're conflicted on how to address it in practice.
Information Governance Perspectives
APRIL 5, 2023
The following excerpt about Artificial Intelligence is based on the book Tomorrow’s Jobs Today , available at Barnes & Noble , Amazon , and other fine booksellers. What is Telematics? Today, the term is commonly used for telematics solutions in commercial fleet vehicles and smart cars. What’s it like to work in this field?
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Schneier on Security
FEBRUARY 7, 2020
Ten years ago, I wrote an essay : "Security in 2020." Here's what I said back then: There's really no such thing as security in the abstract. Security can only be defined in relation to something else. You're secure from something or against something. Well, it's finally 2020. I think I did pretty well.
ForAllSecure
MARCH 8, 2023
And I was really fortunate to land the security beat right away. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. What if you are a woman in information security? And the good news? That is, until Chenxi Wang spoke up. I went to San Francisco.
ForAllSecure
JUNE 8, 2022
With digital convenience there’s often a price. And if that means a bad actor can create a wireless key for your new Tesla, that price is pretty steep. At CanSecWest 2022, researcher Martin Herfurt announced a new tool, TeslaKee.com , which he hopes prevents wireless key attacks from happening. So the car would start. It wasn't very robust.
Thales Cloud Protection & Licensing
JANUARY 4, 2023
Large-scale layoffs may impact security. Large-scale layoffs may impact security. Business security risk is significant and adds to reputational risk. In the Thales 2022 Data Threat Report 78% of respondents ranked accidental or human error in their top four threats posing the greatest security risks.
ForAllSecure
NOVEMBER 13, 2020
In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. As we were leaving the casino, I mentioned the guy and my friend said, “Yeah, I saw him, and I thought he was probably a pro, but I also thought maybe I could beat him.” Apple Podcasts.
Let's personalize your content