Remove Architecture Remove Definition Remove Firewall Remove Information Security
article thumbnail

United Airlines CISO Deneen DeFiore on elevating cyber’s value to the business

CIO Business Intelligence

Deneen DeFiore is a Hall of Fame technology executive who currently serves as vice president and chief information security officer at United Airlines, where she leads the cybersecurity and digital risk organization to ensure the company is prepared to prevent, detect, and respond to evolving cyber threats. Definitely.

Airlines 110
article thumbnail

Why IT leaders are putting more business spin on security spend

CIO Business Intelligence

Gartner projects that spending on information security and risk management products and services will grow 11.3% To better focus security spend, some chief information security officers (CISOs) are shifting their risk assessments from IT systems to the data, applications, and processes that keep the business going.

Security 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Embracing Automation in Cyber Threat Intelligence: The Key to Timely Protection

SecureWorld News

They are extremely valuable because they accumulate information collected by thousands of experts around the world, reflecting a community-driven perspective in information security. This ranges from understanding cryptography to having insights into operating system architecture.

article thumbnail

7 web application development challenges you can’t ignore

mrc's Cup of Joe Blog

Web application definition : A web application is a software application that is accessed through a web browser. The vast majority of developers received training and degrees from schools that minimally addressed information security in the curriculums. Thus, they are unprepared to build secure applications.”.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

So he invites me to go to a book that, you know, one of those first black hats and Doug Song was set doing his thing on checkpoint firewall bypass, and I'm sitting there, and a guy named Jeff Nathan. But it definitely was a different time. I was living in Alameda off of the Navy base there. Come sit next to me. I think those are cool.

article thumbnail

EP 49: LoL

ForAllSecure

The modular nature of Kasaya security architecture will prevent the attack from hindering any modules other than VSA, the rapid response team of Kasaya as well as the tremendous and immediate support of Homeland Security. Vamosi: So bringing this technology bringing the security down to this level.