Remove Company Remove Information Security Remove Network Remove Sports
article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

article thumbnail

5 challenges for securing the future

CIO Business Intelligence

Information security has been an intriguing part of our past, is a critical part of our present, and will be a defining factor in our future. The economics of security are clear: “There is no financial stability without cybersecurity,” writes Loretta J. To have a future requires mastering information security.

Security 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The CISO role in cybersecurity: Solo or team sport?

Cloud Musings

The average length of time in the commercial sector between a network security breach and when the detection of that breach is more than 240 days , according to Gregory Touhill , deputy assistant secretary of Cybersecurity Operations and Programs for the Department of Homeland Security. Could your company survive?

Sports 70
article thumbnail

SecureWorld Returns to Houston with Energy and Enthusiasm

SecureWorld News

SecureWorld returned to Houston for the first time in four years with a conference agenda loaded with impactful panels, vendors tackling topics top of mind to cybersecurity professionals, and a buzz of excitement to be back together again to network, commiserate, and share successes. "It It has been years since I attended a SecureWorld event.

Energy 81
article thumbnail

Spotlight on Cybersecurity Leaders: David Lingenfelter

SecureWorld News

David Lingenfelter is Vice President of Information Security for Penn Entertainment. His role includes overseeing IT security for the company, as well as overseeing IT compliance around SOX, PCI, and gaming regulations. At the time, IT Security was in its infancy as momentum of the dot-com era was just starting to build.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

What if you are a woman in information security? I’m Robert Vamosi, and in the episode I’m talking about diversity, equality, and inclusion in information security with one of the industries' most successful examples. The Twistlock was a company I joined after Intel security was a startup.

article thumbnail

The Hacker Mind Podcast: The Hacker Revolution Will Be Televised

ForAllSecure

In a moment I’ll introduce you to the person who has done this, and given his experience with live broadcasts of CTFs, is working now to make live CTFs a regular e-sport. And Jordan now has his own company. When we founded the company eight years ago. Vector 35, was born out of a history of capture the flag competitions.