article thumbnail

9 biggest information security threats through 2019

Network World

The information security threat landscape is constantly evolving. But that dependence makes them vulnerable to attacks on core internet infrastructure, devices used in daily business and key people with access to mission-critical information. To read this article in full or to leave a comment, please click here

article thumbnail

How to protect your mission-critical information

Network World

But you can get your arms around it if you assess the value of your data and focus your attention on protecting your mission-critical information assets — the crown jewels. Businesses must prioritize the protection of mission-critical information assets," says Steve Durbin, managing director of the ISF.

How To 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

Both nonprofits, their individual missions and goals are synergistic: CSA: To promote best practices for providing security assurance within cloud computing and provide education on the uses of cloud computing to help secure all other forms of computing. Vendors are also stepping up. Grab this Headline Animator ( Thank you.

article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

Both nonprofits, their individual missions and goals are synergistic: CSA: To promote best practices for providing security assurance within cloud computing and provide education on the uses of cloud computing to help secure all other forms of computing. Vendors are also stepping up. Grab this Headline Animator ( Thank you.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

What if you are a woman in information security? I’m Robert Vamosi, and in the episode I’m talking about diversity, equality, and inclusion in information security with one of the industries' most successful examples. So I also have recently launched a nonprofit called the Forte group.

article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

Then again, you might want someone --anyone -- to come in as a Level 1 security analyst so your current Level 1s can advance. But how do you even start to identify who might be good in a role in information security? Vamosi: And that’s just a drop in the ocean for how many more information security people are needed today.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Anyone who has anyone in the information security community is usually melting under the hot Nevada sun. There is other ones such as the car hacking village and stuff but so the the API says village started several years ago at DEF CON to bring education awareness and exposure to industrial control systems technology security.