article thumbnail

An Interview with IO's CISO, Bob Butler, on Logical and Physical.

CTOvision

Podcast: Play in new window | Download. In this podcast I interviewed Bob Butler, Chief Information Security Officer at IO. IO is the leading provider of next-generation modular data center technology and services designs,'

article thumbnail

Tech Moves: Expedia taps execs to run new divisions; Bumble hires Microsoft vet as CTO

GeekWire

Leblond previously spent 25 years at Microsoft leading various engineering teams working on Windows, Office, and other products. Seattle-based digital remittance company Remitly hired Bobby Wilkinson as vice president of global DEI and Darren Challey as vice president and chief information security officer.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Second Factor Authentication With Security Keys

CTOvision

Sam Srinivas, Product Management Director, Information Security, Google, is the organization’s vice president. Both keys work with Unix, Windows, OSX and are recognized as USB HID devices. The board level members include Google , RSA, PayPal, most of the major credit card companies, and other financial institutions.

article thumbnail

Meet MailSniper, a tool to search Microsoft Exchange emails for sensitive info

Network World

Beau Bullock , from the penetration testing firm Black Hills Information Security , cited a 2016 Mandiant M-Trends Report ( pdf ) which claimed organizations are compromised an average of 146 days before detecting a breach.

Meeting 60
article thumbnail

Using ChatGPT to Become Irresistible to Hiring Managers

SecureWorld News

Here's the initial prompt; copy and paste this into your ChatGPT window before you do anything: "Take on the persona of a cybersecurity hiring manager. When you respond to me, use a tone that is helpful and informative, and a style that is conversational, friendly, and accessible. Information Security 2.

Windows 85
article thumbnail

Avoiding The Risks Of Vulnerable Endpoints

CTOvision

Read Bernard Parsons explain how you can avoid the risks of vulnerable endpoints on Information Security Buzz : In today’s world of constant and escalating threats, with breaches becoming a commonplace occurrence, PCs are a constant headache for security teams when it comes to securing IT infrastructure.

Linux 30
article thumbnail

Bad Actor Using New Method to Avert Detection, Google Discovers

SecureWorld News

In a blog post, Neel Mehta, Information Security lead for Google, explains how a hacker has managed to break certificate code parsing to invade email inboxes and infect users with malware. Whether it is ransomware, other types of malware, or any number of cyberattacks, threat actors keep inventing new techniques to cause disruption.

Google 65