Remove Company Remove Conference Remove Information Security Remove Malware
article thumbnail

RSA Conference 2015 – San Francisco 20-24 April 2015

CTOvision

Offering five full days of educational training from experienced industry practitioners, the RSA Conference is widely regarded as one of the world''s leading forums for enterprises and technical information security professionals. This year, the Conference will be held April 20-24 at San Francisco''s Moscone Center.

article thumbnail

Uptycs Identifies New Ransomware Binary Targeting Linux

SecureWorld News

Its malware is specifically geared toward ESXi hosts, as it contains two related commands. David Lingenfelter, VP of Information Security at Penn Entertainment, said during the recorded panel session: "Ransomware is just one of those things that's not going away. Its initial access vector remains unknown.

Linux 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Invincea Announces 54 New Enterprise Customers for Its Flagship Enterprise Solution, $8.1M in Advanced Research Contracts for Its Labs Division

CTOvision

Major Market Demand for Advanced Threat Protection Driving Rapid Platform Adoption and Expansion of Technology Ecosystem; Company Announces Integration With Palo Alto Networks’ Wildfire Platform. In the first quarter of 2014, the company’s advanced research division—Invincea Labs—secured $8.1M contract with the U.S.

CTO Hire 255
article thumbnail

Spotlight on Cybersecurity Leaders: Kip Boyle

SecureWorld News

Kip Boyle is the virtual Chief Information Security Officer (vCISO) for several companies. In the private sector, he was a CISO for an insurance company, credit card processor, bank, credit union, and IT Managed Service Provider. See the conference agenda and register here.

article thumbnail

Why Taylor Swift Fans Should Work in Cybersecurity

SecureWorld News

These skills also happen to apply to information security (infosec) and cyber threat intelligence and research. And you'll leave your first infosec conference with an armful of them. Taylor may be the Mastermind behind the clues, but her fans' determination, critical thinking, and unparalleled passion deserve more credit.

Network 95
article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

.” Two decades later, that line from the Microsoft co-founder’s Trustworthy Computing memo would seem quaint if the reality weren’t so terrifying: ransomware, software supply chain attacks, privacy breaches, nation-state hacks, malware, worms, and adversarial machine learning are just a few of the looming threats.

Microsoft 104
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

I went to smaller conferences. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. What if you are a woman in information security? WANG : Rain capital, as I said, is a cyber focused venture fund we invest in early stage companies, startups.