article thumbnail

The Security Pros and Cons of Using Email Aliases

Krebs on Security

For instance, if I were signing up at example.com, I might give my email address as krebsonsecurity+example@gmail.com. Then, I simply go back to my inbox and create a corresponding folder called “Example,” along with a new filter that sends any email addressed to that alias to the Example folder.

Security 212
article thumbnail

Real-life examples of social engineering ? part 2

IT Governance

Last month, I published an article looking at two examples of the use of social engineering in everyday life. The man, who is still at large, walked in through the front door at regular hours, skipped through all security measures and walked out with the loot. “He Diamonds, diamonds, DIAMONDS. If you’re planning on stealing USD$27.9

Phishing 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

Regulatory compliance and data privacy issues have long been an IT security nightmare. GDPR (among other legal requirements in the EU and elsewhere) can expose multinational organizations to hefty financial penalties, additional rules for disclosing data breaches, and increased scrutiny of the adequacy of their data security.

article thumbnail

On the Cybersecurity Jobs Shortage

Schneier on Security

In April, Cybersecurity Ventures reported on extreme cybersecurity job shortage: Global cybersecurity job vacancies grew by 350 percent, from one million openings in 2013 to 3.5 For example, hiring managers will want a network security engineer with knowledge of networks or an identity management analyst with experience in identity systems.

article thumbnail

Automated Security and Compliance Attracts Venture Investors

eSecurity Planet

In 2013, Adam Markowitz founded Portfolium, an edtech startup that matched college students and graduates with employers. “I I remember the first time we were asked for a SOC 2 report, which quickly became the minimum bar requirement in our industry for proof of an effective security program,” he said. Other investors included J.P.

article thumbnail

MY TAKE: How consumer-grade VPNs are enabling individuals to do DIY security

The Last Watchdog

I also saw this as an opportunity to get better informed about consumer security concerns. Companies have long used enterprise-grade VPNs to enable their employees to securely tunnel into corporate networks from remote locations. DIY security. Surfshark Alert is a representative example of this trend.

B2C 214
article thumbnail

MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

The Last Watchdog

The Cloud Access Security Broker (CASB) space is maturing to keep pace with digital transformation. One company still actively innovating as an independent CASB is San Jose, CA-based security vendor CipherCloud. CASBs began by closing glaring security gaps created by the rapid adoption of mobile devices and cloud tools.