article thumbnail

Why IT leaders are putting more business spin on security spend

CIO Business Intelligence

Gartner projects that spending on information security and risk management products and services will grow 11.3% But despite those expenditures, there have already been at least 13 major data breaches, including at Apple, Meta and Twitter. to reach more than $188.3 billion this year.

Security 111
article thumbnail

‘The Everything War’: Inside Amazon with author and Wall Street Journal reporter Dana Mattioli

GeekWire

.” Amazon’s lax internal controls for confidential data: “I learned that Amazon, even though they’re one of the biggest, most sophisticated companies in the world, has very primitive firewalls in place to protect confidential data. Subscribe to GeekWire in Apple Podcasts , Spotify , or wherever you listen.

Journal 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

Apple Podcasts. I’m Robert Vamosi and this episode about best practices in information security, and how critical life services, in particular, remain at risk today -- in the middle of a global pandemic. Number two, put up some shields, some guards, whether it be a firewall and so on and so forth. Google Podcasts.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

Apple Podcasts. I’m Robert Vamosi and this episode about best practices in information security, and how critical life services, in particular, remain at risk today -- in the middle of a global pandemic. Number two, put up some shields, some guards, whether it be a firewall and so on and so forth. Google Podcasts.

article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. Literally, how the rebellion fighting the Empire has echoes in how we approach and mitigate information security threats. But in information security, it's not always true.