article thumbnail

Photograph Leak Demonstrates Importance of Good Hygiene

CTOvision

The Washington Post , The New York Times , and The Wall Street Journal have dedicated front-page links to the story, in a press wave that will contribute to the public’s increasing exposure to cybersecurity concepts and the growing importance of information security. The scandal reflects several technology trends.

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat. Massive numbers.

Media 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat. Massive numbers.

Media 52
article thumbnail

Key considerations to cancer institute’s gen AI deployment

CIO Business Intelligence

Most departments had specific problems they were trying to solve, or an example of work that could be exponentially more efficient,” she says. I was pleasantly surprised that people had solid examples of how to make jobs better,” she says. “No For example, the AIs could review documentation or create draft messages.

article thumbnail

5,200 Data Breaches Analyzed in Annual Verizon Report

SecureWorld News

Seventy-four percent of breaches included the human element, which should be expected given the frequency of social engineering, stolen credentials, and privilege misuse. No surprise, social engineering is mentioned right off the bat. Examples include criminal groups, lone hackers, former employees, and government entities.

Report 83
article thumbnail

E-Government: A Graduate Class

CIO Musings

Not setting a very good example I am afraid. The class title is INFO 691 Topics in Information Systems – Digital Government This class is about using information and communication technologies to provide government services. Open data, social media, websites, APIs, collaboration & sharing networks.

article thumbnail

Selling the C-suite on preemptive IT investments

CIO Business Intelligence

But disaster recovery is just one example of projects that are of an important and preemptive nature that CIOs want to fund but find de-prioritized when it comes to budget approval. Others include preparation for zero-day attacks, almost anything having to do with data stewardship, as well as IT training and social engineering audits.