Remove 12
Remove 2014 Remove Manufacturing Remove Sales Remove Security
article thumbnail

Top cybersecurity Predictions for 2020

Security Affairs

Let’s try to imagine what threats and bad actors will influence the cyber arena in the next 12 months. Threat actors behind ransomware campaigns will switch tactics, leveraging access to organizations available for sale in the cybercrime underground. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

GCIS was a Davos-level conference with no vendors and no selling, where scores of chief security information officers (CISOs), top CEO’s, industry and government thought leaders and leading innovators discussed the myriad challenges in and around cybersecurity and possible solutions in today’s environment. The current number of U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events.

article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

A royal baby, a fire at Notre-Dame, the highest grossing film of all time and more than 12 billion breached data records: 2019 has been quite a year. IT Governance is closing out the year by rounding up 2019’s biggest information security stories. Part one covers January to June, and will be followed by part in the coming days.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

And I was really fortunate to land the security beat right away. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. What if you are a woman in information security? WANG : it was the security security practice. By accident. So I learned.

Cloud 40
article thumbnail

Group with numerous faces: chronicle of UltraRank’s deceptive JS-sniffer campaigns

Security Affairs

Group-IB security researchers provide evidence linking three campaigns with the use of various JS-sniffer families. This very website was used to load the malicious script on the website of the largest manufacturer and distributor of cash handling products in North America, Block & Company. First clue.

Marketing 113
article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

She left a very successful corporate role in late 2014 and very shortly after, my own corporate job was made redundant. Let's imagine you need a couple of thousand for 12 weeks: I highlighted the most important part in red because for some reason it was very small and a bit hard to read. Work your arse off.

Education 111