Remove 2015 Remove Information Security Remove Programming Remove Social
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat. Did he have a plan?

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat. Did he have a plan?

Media 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

E-book: Educate Yourself With Dell Insight Partner Views on Cybersecurity

Cloud Musings

Some see these breaches as a threat to national security and in response, the U.S. The “Insight Partner Views on Cybersecurity” captures the latest news, trends and best practices surrounding cybersecurity by influential bloggers in the Dell Insight Partner program. Jackson 2015 ) Follow me at [link].

Dell 70
article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

This latter scenario has been driven by the lack of industry consensus on security and a dearth of nonvendor specific cloud security training and certifications. A specific example of strong industry cloud security capabilities is Dell SecureWorks. Jackson 2015 ) Follow me at [link].

article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

This latter scenario has been driven by the lack of industry consensus on security and a dearth of nonvendor specific cloud security training and certifications. A specific example of strong industry cloud security capabilities is Dell SecureWorks. Jackson 2015 ) Follow me at [link].

article thumbnail

The CISO role in cybersecurity: Solo or team sport?

Cloud Musings

The average length of time in the commercial sector between a network security breach and when the detection of that breach is more than 240 days , according to Gregory Touhill , deputy assistant secretary of Cybersecurity Operations and Programs for the Department of Homeland Security. Jackson 2015 ) Follow me at [link].'

Sports 70
article thumbnail

The Emerging Science of Digital Forensics

Cloud Musings

The consumerization of IT and the adoption of cloud, mobile and social media by enterprise organizations is opening a new threat landscape and new threat vectors. The emerging science of digital forensics and cybercrime investigation has become very important for national security, law enforcement, and information assurance.

Dell 70