article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. Bigman worked in every area of information and data security, the last fifteen years as the Agency’s Chief Information Security Officer (CISO).

Software 257
article thumbnail

The chaotic and cinematic MGM casino hack, explained

Vox

Cannon/Las Vegas Review-Journal/Tribune News Service via Getty Images A betting kiosk at MGM Grand on September 12, two days into the hack shut down many of MGM’s systems. They’ve shut down major gas pipelines , banks , hospitals , schools , meat producers , governments , and journalism outlets.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Life at ForAllSecure: Robert Vamosi, Director of Product Marketing

ForAllSecure

I was a journalist at ZDNet, hired basically to cover the security space, and then ZDNet became CNET. In journalism, you get moved around a lot, but I was fortunate in my entire career at ZDNet and CNET to stay within the security space. But I decided to move away from pure journalism. I started in journalism.

Journal 40
article thumbnail

10 Security Quotes: Microsoft, CrowdStrike, SolarWinds, and FireEye Talk to Congress

SecureWorld News

However, SecureWorld has picked off 10 quotes that speak to the state of information security and the mindset of these leaders from corporate America. Basic cyber hygiene and security best practices were not in place with the regularity and discipline we would expect of federal customers with the agencies’ security profiles.

article thumbnail

4 tips to improve employee experiences while maintaining security and governance

CIO Business Intelligence

Overly restrictive security controls can create friction for employees who need ready access to the apps and tools they need on a daily basis. IT and security teams must strike the proper balance between the two. This requires politics and persuasion on the part of the chief security officer.”