article thumbnail

Acknowledging Our Love-Hate Relationship With Security Certifications

Forrester IT

It’s nothing new that social media is a hotbed of hot takes. Even the most innocuous posts somehow manage to offend or anger someone out there on the internet. But that doesn’t mean that it should all be dismissed as nonsense, especially when it comes to information security.

Security 195
article thumbnail

Net Threats: Internet Openness in Danger

CTOvision

Reflecting the increasing attention paid to information security by many Americans, Pew Research recently conducted a large study, “ Net Threats ”, to identify important trends among technology experts’ opinions and predictions regarding the future of digital security.

.Net 269
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Photograph Leak Demonstrates Importance of Good Hygiene

CTOvision

The Washington Post , The New York Times , and The Wall Street Journal have dedicated front-page links to the story, in a press wave that will contribute to the public’s increasing exposure to cybersecurity concepts and the growing importance of information security.

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

This shows that many modern cyber security challenges are network-agnostic, which means the most popular cyber attack methods typically don’t focus on the network technology the company uses to access the internet. The need for improved rural internet service has been recognized by both governments and businesses alike.

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat.

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat.

Media 52
article thumbnail

5,200 Data Breaches Analyzed in Annual Verizon Report

SecureWorld News

Seventy-four percent of breaches included the human element, which should be expected given the frequency of social engineering, stolen credentials, and privilege misuse. No surprise, social engineering is mentioned right off the bat. These criminals' methods can be predictable. These patterns are important to follow closely.

Report 83