Remove Enterprise Remove Information Security Remove Network Remove Nonprofit
article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

Both nonprofits, their individual missions and goals are synergistic: CSA: To promote best practices for providing security assurance within cloud computing and provide education on the uses of cloud computing to help secure all other forms of computing. Vendors are also stepping up.

article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

Both nonprofits, their individual missions and goals are synergistic: CSA: To promote best practices for providing security assurance within cloud computing and provide education on the uses of cloud computing to help secure all other forms of computing. Vendors are also stepping up.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Tech Moves: Expedia board director Skip Battle resigns; Madrona promotions; Vacasa’s new CFO

GeekWire

Identity authentication startup Auth0, which raised a $120 million Series F round in July, added three new board members: • Former Hewlett Packard Enterprise Chief Sales and Marketing Officer Sue Barsamian. She succeeds co-founder David Brown, who will remain on the board of the global network for entrepreneurs. Redmond, Wash.-based

Groups 72
article thumbnail

The ‘Great Retraining’: IT upskills for the future

CIO Business Intelligence

The 300-person shop doesn’t focus on the classic network or data center support roles — those are outsourced to service providers.

Training 131
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. What's in there?

System 52
article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Anyone who has anyone in the information security community is usually melting under the hot Nevada sun. Van Norman: We get people all over from students and academia we get controls people that work on the control systems engineers and technicians who want to learn more about security. I can do those basic things.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

You got into a network. CLEMENS: And really I was just starting that in the vein of old DEF CON and 2600 stuff where it was, we should share information. But I was given a Class A network, and I deployed as many snort sensors on it all over. It seems like it was just there to have a network of people to try to approach us.