Remove category
Remove Information Security Remove Manufacturing Remove Marketing Remove Security
article thumbnail

Counting Down to the EU NIS2 Directive

Thales Cloud Protection & Licensing

Counting Down to the EU NIS2 Directive madhav Thu, 05/23/2024 - 05:16 Our recently released 2024 Data Threat Report showed a direct correlation between compliance and cyber security outcomes. NIS2 adds digital service providers, waste management, pharmaceutical and labs, space, and public administration to the ‘Essential’ sectors category.

article thumbnail

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

and Tenable, which went public in 2018 with a market capitalization of approximately $4 billion. Two of Ackerman’s cyber startups — Synack and Area 1 Security had their origins in Maryland and the NSA, but both realized quickly that they needed the playbook, expertise, resources and relationships of Silicon Valley to succeed. “So,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: major cyber attacks on UK likely, Trump malware, and more Spectre and Meltdown problems

IT Governance

This week, we discuss Norton’s new Cyber Security Insights Report, the inevitability of a category one cyber attack on the UK, unofficial PDFs of Fire and Fury spreading malware, and further fallout from the Spectre and Meltdown CPU vulnerabilities. The first major cyber security report of the year has landed.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

And I was really fortunate to land the security beat right away. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. What if you are a woman in information security? WANG : it was the security security practice. By accident. So I learned.

Cloud 40
article thumbnail

The Hacker Mind Podcast: The Hacker Revolution Will Be Televised

ForAllSecure

We thought, hey, this reverse engineering market hasn't really changed forever. There are a few good tools on the market today. Binary Ninja is lucky in that it serves an interesting niche in the market. Gator would have entirely destroyed that market for us because we wouldn't have been the most affordable in the town.

IT 40