Remove cyber-resiliency-begins-with-people-and-process-not-technology
article thumbnail

4 Ways North Korea Is Targeting Security Researchers

SecureWorld News

One of the strategies Google's TAG team says the nation-state hackers are using is imitating those they want to attack: "In order to build credibility and connect with security researchers, the actors established a research blog and multiple Twitter profiles to interact with potential targets. Can security researchers be socially engineered?

article thumbnail

Continuous Monitoring – Part 2

CTOvision

The process of Managing Assets includes tracking all hardware and software products (PCs, servers, network devices, storage, applications, mobile devices, etc.) The process of Managing Assets includes tracking all hardware and software products (PCs, servers, network devices, storage, applications, mobile devices, etc.)

article thumbnail

List of the world’s top female futurists (Update #5)

Trends in the Living Networks

I know many outstanding female futurists, so whenever I am asked I point to a range of exceptional futurists to show that there are indeed many women in the field. However it is true that many are not as well known as they should be. Melissa Sterry. Jaana Tapanainen-Thiess. Mariana Todorova. Catarina (Cat) Tully. Kristel Van der Elst. Rosa Alegría.

Study 148