article thumbnail

Your Enterprise has too many Cyber-ish People

CTOvision

Cyber has been called the ultimate team sport: CIOs, CTOs, SysAdmins, Software Developers, CISOs, threat teams, red teams, testing groups, etc. It seems more like a jobs program that moves headcount from one part of the enterprise to the expensive nerdy-side. By John Scott. etc, but really should it be?

article thumbnail

Written Speech: TEDxMaui -- Hack Yourself First

Jeremiah Grossman

I should mention that firewalls and anti-virus software don’t provide any sort of real protection to any of this. Having said that, improving international cyber-crime law enforcement is a path necessary to pursue as part of a larger program, but we should be realistic about its limits. The industry calls this Bug Bounty programs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

After a record year for Israeli startups, 16 investors tell us what’s next

TechCrunch

Guardicore is disrupting the traditional firewall market by providing fine-grained segmentation for greater attack resistance. Any area that is exposed to mass physical engagement (pockets in travel, food, sports, etc.) JoyTunes, led by Yuval Kaminka has developed a music-learning platform that has skyrocketed in 2020. are at risk.

article thumbnail

How USB sticks help drive freedom in North Korea (Q&A)

The Parallax

New research explores how the Great Firewall of China works. “We We professionally wipe all of the drives that we get, before the new content is loaded on there,” says Warnock, whose oversight of a program called Flash Drives for Freedom began in January. How to strike a balance between security and privacy (Q&A).

Media 160