article thumbnail

What’s the Top Information Security Priority for Every SMB

Social, Agile and Transformation

Some context: I rarely blog about information security because it’s outside my core expertise in digital transformation. It’s hard to drive transformation and also have a risk and security mindset, and it’s extraordinarily time-consuming to keep up with the latest security threats.

article thumbnail

Emerging Digital Trailblazers: 15 Ways to Hire and Train for Entry Level High Potentials

Social, Agile and Transformation

That was the topic at a recent Coffee with Digital Trailblazers, where we discussed how to evaluate, hire, and train entry-level employees in product management, DevOps, data science, marketing, information security, and other roles with high

Training 170
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Tech Moves: Delivery giant Gopuff adds Seattle-area execs; Wheels Up names president; and more

GeekWire

She was most recently CEO of NetHope, a consortium helping NGOs secure funding and apply technology to their missions. Founded in 2012, DataKind connects organizations with pro bono data science and AI experts to tackle social issues. based BitTitan appointed Joseph Nguye n as its first director of information security.

CTO Hire 116
article thumbnail

Tech Moves: Delivery giant Gopuff adds Seattle-area execs; Wheels Up names CEO; and more

GeekWire

She was most recently CEO of NetHope, a consortium helping NGOs secure funding and apply technology to their missions. Founded in 2012, DataKind connects organizations with pro bono data science and AI experts to tackle social issues. based BitTitan appointed Joseph Nguye n as its first director of information security.

article thumbnail

Moving beyond usernames and passwords

CIO Business Intelligence

In the T-Mobile case, Lapsus$ members hacked into T-Mobile’s network in March 2022 by compromising employee accounts, either via phishing or another form of social engineering. Another recent breach took advantage of a company’s sales team via social engineering. Cyberattacks, Data and Information Security, Risk Management

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

What if you are a woman in information security? I’m Robert Vamosi, and in the episode I’m talking about diversity, equality, and inclusion in information security with one of the industries' most successful examples. I can dream about being different because there are white male role models.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

The SyTech projects exposed included social media monitoring solutions and TOR deanonymization tools. It's part of this movement to shift left from doing security testing at the end of application development to really making it part of the entire development lifecycle. First, you get, actually, a higher reliable software.