Remove category security-breach
article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Related: Atrium Health breach highlights third-party risks. And this continues to include enterprises that have poured a king’s ransom into hardening their first-party security posture. There is impetus for change – beyond the fear of sustaining a major data breach.

Risk 147
article thumbnail

SEC Chair: Sweeping New Cybersecurity Rules Are Coming Soon

Data Matters

On Monday, January 24, 2022, in a speech at the Northwestern University Pritzker School of Law annual Securities Regulation Institute conference, Gary Gensler, Chair of the U.S. He also signaled the SEC’s continued focus on enforcement and cooperation with other law enforcement agencies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

And I was really fortunate to land the security beat right away. I went to smaller conferences. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. What if you are a woman in information security? WANG : it was the security security practice.

Cloud 40
article thumbnail

SHARED INTEL: Akamai reports web attack traffic spiked 62 percent in 2020 — all sectors hit hard

The Last Watchdog

Akamai, which happens to be the Hawaiian word for “smart,” recently released its annual State of the Internet security report. Q: Can you give me a feel for the major categories of attacks? Criminals even offer training to those who are new. This training can be pirated security training videos or books, or actual classes.

article thumbnail

What is Network Security? Definition, Threats & Protections

eSecurity Planet

Network security creates shielded, monitored, and secure communications between users and assets. Securing the expanding, sprawling, and sometimes conflicting collection of technologies that make up network security provides constant challenges for security professionals.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

4 The Federal Rules of Civil Procedure have begun — since their inception — with a guiding command for courts to seek “to secure the just, speedy, and inexpensive determination of every action and proceeding.”5 social security and credit card numbers, employee and patient health data, and customer financial records).”43

Privacy 94
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences.