Remove 12
Remove 2017 Remove Data Remove Information Security Remove Manufacturing
article thumbnail

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

It’s a cybersecurity and data science “foundry” that uniquely helps create, finance and intensely coach brand-new startups manned by former cybersecurity and data science veterans of select federal research centers and national laboratories. According to the U.S. This made it the nation’s eighth-largest technology hub.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: Google+, Supermicro and Heathrow

IT Governance

Hello and welcome to the IT Governance podcast for Friday, 12 October. As many as 438 third-party apps were potentially able to access the data of up to 500,000 Google+ account holders without their permission because of a vulnerability in one of its APIs. Here are this wee- actually, can we have a quick word about that theme tune?

article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

A royal baby, a fire at Notre-Dame, the highest grossing film of all time and more than 12 billion breached data records: 2019 has been quite a year. IT Governance is closing out the year by rounding up 2019’s biggest information security stories. million people – just under a third of the country’s population.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

Listen to EP 12: Hacking Healthcare. I’m Robert Vamosi and this episode about best practices in information security, and how critical life services, in particular, remain at risk today -- in the middle of a global pandemic. And so far we've had reassurance from them that no patient data has been compromised.

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

Listen to EP 12: Hacking Healthcare. I’m Robert Vamosi and this episode about best practices in information security, and how critical life services, in particular, remain at risk today -- in the middle of a global pandemic. And so far we've had reassurance from them that no patient data has been compromised.

IT 52
article thumbnail

Forescout Platform: NAC Product Review

eSecurity Planet

Virtual appliances can be deployed in local data centers or in the cloud. This article was originally written by Drew Robb on July 7, 2017 , and updated by Chad Kime on April 7, 2023. to stringent (quarantine assets, turn off switch port, block access, disable network card, etc.)

IoT 98