article thumbnail

InfoSec Leaders Share in Podcast Interview at SecureWorld Philadelphia

SecureWorld News

Find the recording on the BarCode website , on Apple Podcasts , or on YouTube. Featured guests are Krista Arndt, CISO, United Musculoskeletal Partners; David Lingenfelter, VP of Information Security, Penn Entertainment; and Bistra Lutz, Director of Global Information Security Operations, Crown Holdings.

Barcode 102
article thumbnail

Uptycs Identifies New Ransomware Binary Targeting Linux

SecureWorld News

Find the session recording on the BarCode website , on Apple Podcasts , or on YouTube. David Lingenfelter, VP of Information Security at Penn Entertainment, said during the recorded panel session: "Ransomware is just one of those things that's not going away. I mean, ransomware-as-a-service, we all have heard of that one by now.

Linux 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why IT leaders are putting more business spin on security spend

CIO Business Intelligence

Gartner projects that spending on information security and risk management products and services will grow 11.3% But despite those expenditures, there have already been at least 13 major data breaches, including at Apple, Meta and Twitter. to reach more than $188.3 billion this year.

Security 111
article thumbnail

Best IT and Tech Blogs – Must Read Information Technology Resources 2019

Galido

Their experience makes theirs perfect security blog to stay up-to-date with the latest zero-day threats and cybersecurity news. Help Net Security. Help Net Security has been a valuable resource for information security news since 1998. Zone Alarm Cyber Security Blog. Info Security Magazine.

Resources 113
article thumbnail

The Importance of an Online Encryption Policy

CTOvision

Even IT giants such as GoDaddy, Apple, and Google weren’t spared from cyber attacks. It covers the systematic data management of the company and can also be referred to as information security policy standards when working in an on-premise, cloud, or a hybrid-computing environment.

Policies 283
article thumbnail

Tech Blogs – Best Must Read Tech Resources 2019

Galido

Gizmodo , is a popular tech site that went viral after they paid for a “lost” next-generation Apple iPhone — the news became front-page across the world. Their experience makes theirs perfect security blog to stay up-to-date with the latest zero-day threats and cybersecurity news. Help Net Security. Info Security Magazine.

Resources 107
article thumbnail

Best Tech Blogs – Must Read Tech Resources 2019

Galido

Gizmodo , is a popular tech site that went viral after they paid for a “lost” next-generation Apple iPhone — the news became front-page across the world. Their experience makes theirs perfect security blog to stay up-to-date with the latest zero-day threats and cybersecurity news. Help Net Security. Info Security Magazine.

Resources 107