Remove Information Security Remove Intel Remove Network Remove Social
article thumbnail

Game Change: Three Reasons Why #SonyHack Will Change Security

CTOvision

Most corporate hacks we see are focused on either customer data (credit cards, medical records, social security numbers, passwords, bank account information, email addresses) or company proprietary documents. The hackers captured and exfiltrated hundreds of terabytes of data then torched the network with wiper malware.

Security 282
article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

Will the National Security Community be capable of offering security protection, including security advice, for massive commercially or privately owned networks of sensors and remotely controllable devices? Managing Director Security. Chief Information Security Officer. Intel Corporation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

What if you are a woman in information security? I’m Robert Vamosi, and in the episode I’m talking about diversity, equality, and inclusion in information security with one of the industries' most successful examples. VAMOSI: And after Forrester she went to Intel, which at the time had purchased McAfee.

article thumbnail

The Hacker Mind Podcast: How To Get Paid To Hack

ForAllSecure

And the rest, they say is this as a reporter, I was in a position to learn as I wrote about information security. Stok : DEF CON that that summer for hacker summer camp and got invited or more or less kind of social engineer myself into a hacker one live hacking event used to be at the bar. But what if you're on your own?

How To 40
article thumbnail

Embracing Automation in Cyber Threat Intelligence: The Key to Timely Protection

SecureWorld News

They are extremely valuable because they accumulate information collected by thousands of experts around the world, reflecting a community-driven perspective in information security. And if a threat actor employs social engineering , the analyst might even need a basic grasp of psychology.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. I like that kind of social interaction part. I started in journalism. So I saved a lot of money to go.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. I like that kind of social interaction part. I started in journalism. So I saved a lot of money to go.