Remove Information Security Remove Meeting Remove Programming Remove Social
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat. Did he have a plan?

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat. Did he have a plan?

Media 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight on Cybersecurity Leaders: Donna Ross

SecureWorld News

Before joining Radian, Donna had senior level roles in security and compliance at Accolade, Corning Incorporated, GMAC, and Prudential. Radian Group has innovative solutions (products and services) and is committed to social responsibility. A : Information Security. A : Learning, networking, and meeting with partners.

article thumbnail

Threat Intelligence and Security Awareness?

SecureWorld News

In our exclusive Behind the Scenes interview series, we take a deeper look at a topic that is relevant to the information security community. Today's conversation answers this question: How can threat intelligence strengthen security awareness? Will you give us some information on each one? What are you seeing?

article thumbnail

8 data strategy mistakes to avoid

CIO Business Intelligence

How enterprises gather, store, cleanse, access, and secure their data can be a major factor in their ability to meet corporate goals. Undervaluing unstructured data Much of the data organizations accumulate is unstructured, whether it’s text, video, audio, social media, images, or other formats.

Strategy 135
article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

The US Department of Agriculture’s ReConnect Program furnishes loans and grants to provide funds for the costs to construct, improve, or acquire the facilities and equipment needed to provide broadband service in eligible rural areas.

article thumbnail

2020 Was a Privacy Wake-up Call: Don't Go Back to Sleep in 2021!

SecureWorld News

And not only work-from-home (WFH) employees have been affected, but also those mobile workers and all the contracted workers and supply chain workers who have largely been going under the radar of CISOs and information security departments for the past two to three decades. 15-20 minutes).