article thumbnail

How to protect your mission-critical information

Network World

But you can get your arms around it if you assess the value of your data and focus your attention on protecting your mission-critical information assets — the crown jewels.

How To 60
article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

These are consensus driven by teams of experts to help you first with the CIS benchmarks, configure systems securely to a set of agreed upon standards that have the biggest impact for a particular set of products.

CTO 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The anatomy of a Facebook account heist

Vox

He now works as a threat hunter at the National Cyber Security Center (NCSC) in Vietnam, in addition to serving as the co-founder of Chống Lừa Đảo, an anti-scam nonprofit. Exactly how hackers go after legitimate accounts varies. I documented as much as I could,” she said. “I It’s heartbreaking.”

Groups 141
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

I wanted to both write and direct, having no idea how to get from my humble home to Hollywood. I did get a film degree in college, along with an English degree, but after college, well, knowing how the sausage was made, I wasn’t keen on going to Hollywood. What if you are a woman in information security?

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security. Tennisha: Black Girls hack is a nonprofit organization we recently got our 501 C three designation. Vamosi: So what am I missing here.

Study 40
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security. Black Girls hack is a nonprofit organization we recently got our 501 C three designation. Vamosi: So what am I missing here.

Study 40
article thumbnail

Top 15 project management certifications

CIO Business Intelligence

From hardware and software upgrades to ongoing security patches, to application development and the rollout of software itself, project managers keep your teams on task and productive. 11, 2001, terrorist attacks to address issues of cyberterrorism and the information security of nations at large.