How to Build the Most Effective Information Security Framework

Tenable

Build a comprehensive defense of against cyberattacks with a strong information security framework that leverages the world's best standards and infosec tools. . If your organization falls under their purview, their rules have to be part of your information security program.

How machine learning impacts information security

O'Reilly on Data

Burt and cybersecurity pioneer Daniel Geer recently released a must-read white paper (“Flat Light”) that provides a great framework for how to think about information security in the age of big data and AI. They list important changes to the information landscape and offer suggestions on how to alleviate some of the new risks introduced by the rise of machine learning and AI. Continue reading How machine learning impacts information security

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Why cybersecurity pros need to learn how to code

TechBeacon

There is an age-old debate in security: Should cybersecurity professionals know how to code? Security, Information Security, CareersShould they invest the time and effort to learn?

Guide to Serverless Information Security

Stackery

Information security & serverless applications. Information security (infosec) is a broad field. After all, the mandate for security is not “do X”, but instead “ensure no one can do X, Y, Z, ?, ?, ?, fallbacks for network-level security (where necessary).

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

K-12 Data Security Tips from PowerSchool’s Chief Information Security Officer

PowerSchool

By Rich Gay, Chief Information Security Officer & VP of Development , PowerSchool . No school or district can be 100 percent safe from cybersecurity attacks. Las t year alone, there were 122 data security incidents reported at K-12 schools, according to a recent report by the K-12 Cybersecurity Resource Center. The good news is that there are many ways to be proactive and secure your student and staff information.

5 ways to attract the best information security pros

TechBeacon

Security, Information Security, Special Coverage: RSA Conference 2020, RSA Conference, CareersRSA Conference 2020 was focused on the human element for the first time, and thankfully so.

The state of the cybersecurity job field: 5 key factors you need to know

TechBeacon

Many cybersecurity team leaders continue to face challenges in finding qualified cybersecurity professionals to fill jobs at their organizations, despite the relatively high salaries and stability associated with jobs in the field. Security, Information Security, Careers

Protected Health Information: Securing PHI and Staying HIPAA Compliant

Altexsoft

Lots of organizations store and process protected health information, or PHI for short, which makes them targets of malicious entities or people who want to use sensitive data for personal and monetary gains. How to secure PHI to stay HIPAA-compliant.

Build your cybersecurity A-team: 7 recruiting tips

TechBeacon

million cybersecurity jobs unfilled this year, the recruiting and retaining of information security pros has become more important than ever. Security, Information Security, IT Hiring, CareersWith more than 3.5

How to Package and Price Embedded Analytics

With this approach, you turn features off and on through visibility controls, conditional logic, and your application’s security model. You need to be able to use your existing security. leveraging adaptive security models >. security • Dashboards • Widgets • Pages • Tables.

The cybersecurity resource problem: 4 ways to get proactive

TechBeacon

Resources have always been a problem when it comes to cybersecurity. You are not always rewarded for doing security they way you are when you develop a new business application quickly. This usually leads to security teams being understaffed and overworked.

Close your cybersecurity skills gap with untapped talent

TechBeacon

Across all industries and organizations of all sizes, the cybersecurity skills gap continues to pose challenges. Security, Information Security, IT Hiring, Careers

Update your cybersecurity practices: Shift to cyber resilience

TechBeacon

As the world becomes more digitally connected, the need for strong cybersecurity practices is increasing exponentially. Security, Information Security, Cyber Resilience

10 Tips for Maintaining Information Security During Layoffs

CTOvision

Read Joan Goodchild list 10 information security tips for companies during layoffs on Dark Reading: Business disruption and the financial toll brought on by the COVID-19 has forced many companies, […].

5 Early Indicators Your Embedded Analytics Will Fail

application admins say it’s a pain to manage security settings in two different places.” When we need to update the information in the dashboard, we don’t like having to leave. Updating your application’s dashboards and reporting features. may feel optional—until suddenly it’s not.

Meet Boston’s First Chief Information Security Officer

Sailpoint

Walsh announced Greg McCarthy’s appointment as the city’s first chief information security officer (CISO). McCarthy will lead the cybersecurity team within the Department of Innovation and Technology. In this interview, we discuss his career, how the role of cybersecurity has changed within the city, and how security in the public sector can be different than in the private sector. I started as a project manager and was the second person on the security team.

Why this cybersecurity executive order is no different than the last EOs

TechBeacon

President Biden’s recent “Executive Order on Improving the Nation’s Cybersecurity” has been hailed by many as a significant step forward in protecting the infrastructure of the United States against the serious threats that it faces.

Secure your IoT: Why smart attack and insider threat detection is key

TechBeacon

What keeps cybersecurity professionals up at night? IoT can present some scary challenges for information security pros. Security, Information Security, Micro Focus Author, Micro Focus Security Author, Internet of Things (IoT), Native-Ad

IoT 64

Planbox Achieves ISO 27001, 27017 and 27018 Information Security Certification

Planbox

Planbox becomes compliant with the highest international information security standards. With these certifications, customers can be assured that Planbox has implemented the necessary systems and processes for the ongoing protection of their information.

Your Team's Pragmatic Guide to Security

Speaker: Naresh Soni, CTO, Tsunami XR

The pandemic has led to new data vulnerabilities, and therefore new cybersecurity threats. As technology leaders, it's time to rethink some of your product security strategies. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.

Cybersecurity Mesh – Key Considerations before Adoption & Implementation

Trigent

Incidents of cyberattacks continue to jeopardize data security. Not surprisingly, then, enterprises are now focusing on strengthening cybersecurity. Let’s delve deeper to know what it’s all about and how it’s changing the IT security paradigm across the globe.

Netflix Information Security: Preventing Credential Compromise in AWS

Netflix TechBlog

Today, we would like to share two additional layers of security: API enforcement and metadata protection. For more information on how the AWS services mentioned work, see the Background section at the end of this post. Coupling a Metadata proxy with API enforcement increases the security stance of your AWS environment, implementing defense in depth protections. Will Bengtson, for Netflix Security Tools and Operations Background What is a credential?

AWS 86

Do cybersecurity like a boss: 35 experts to follow on Twitter

TechBeacon

Staying on top of security is a big job, and Twitter can help. Listed here, in alphabetical order, are 35 researchers, hackers, and gurus whose Twitter feeds will keep any security specialist well informed on the latest developments and thinking in the industry.

AI and cybersecurity: 3 things your team needs to know

TechBeacon

Security, Information Security, Predictive Analytics

IoT 113

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Shifting security left to the earliest part of development is currently in the spotlight in the developer world. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter. It's time to manage your team's energies to maximize DevOps efficiency, all the while maintaining top security standards. Join Shlomo Bielak, and learn how to keep your DevSecOps team focused and connected without creating silos.

Is Information Security the Right Profession for Me?

Linux Academy

Wondering if information security is the right profession for you? I’ve been working in information security for many years and have had the opportunity to fill a variety of roles. In this post, I’ll fill you in about some of the available jobs in information security and what it takes to succeed in each one. First off, there are many different jobs within information security. Security Analyst (Blue Teamer).

AI and cybersecurity: Why machine learning is a threat detection game-changer

TechBeacon

Organizations are deluged with billions of security events every day, far too many for human analysts to cope with. But security analysts have a powerful ally in their corner: machine learning is tipping the advantage toward defenders. Security, Information Security, Machine Learning

Cybersecurity Q&A with Dave Elfering, VP information security at Werner Enterprises

Sailpoint

Dave Elfering, currently Vice President of information security has also witnessed a considerable amount of growth and change over his career when it comes to information security. In 1997, Elfering began working at Werner as a project manager to help the company build its online presence and secure its data. Tell us how you got interested and eventually started in information security? I started writing a lot of security policies.

Why health care cybersecurity is in ‘critical condition’

The Parallax

government-sponsored Health Care Industry Cybersecurity Task Force delivered more than 100 recommendations to the Department of Homeland Security to make medical technology more resistant to hackers. For the report’s conclusion, 21 health care professionals, clinicians, policy experts, and cybersecurity experts had signed off on using the word “critical” to describe the condition of health care cybersecurity. READ MORE FROM ‘NO PANACEA FOR MEDICAL CYBERSECURITY’.

How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

The new DevSecOps team is up and running, and you feel ready to take on rising security threats while delivering quality software updates. But that leaves just one question: how do you monitor your new program as effectively and efficiently as possible? Join Shannon Lietz, Director of DevsecOps at Intuit, and award-winning innovator, to learn the answers to these questions so you can lead your DevSecOps team to the top!

9 disruptive security plays from RSAC 2019

TechBeacon

Bad actors have always had the edge in cybersecurity. After all, the good guys have to secure everything, while the bad guys need find only one vulnerability. Security, Information Security, Information Security (Info Sec), Special Coverage: RSA Conference 2019

Cybersecurity Awareness Month: Is it time to review your approach?

TechBeacon

For most folks, October is a month for ghosts and goblins, but for the last 15 years the Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA) have had a different emphasis: National Cybersecurity Awareness Month (NCAM). Security, Information Security, Information Security (Info Sec

58

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. The conference brings together cyber security researchers, program managers, decision makers, security vendors, and practitioners to discuss many challenging tasks and novel solutions pertaining to cyber security. By Charles Hall.

3 Cybersecurity Technologies You Should Know

The Crazy Programmer

Cybersecurity is more critical than ever in today’s modern world, especially with news of ransomware attacks and other forms of malware on the rise. The majority of cyber-attacks actually use phishing or social engineering, where users are tricked into revealing personal information.

The Definitive Guide to Creating a Reliable Mobile App

Hear from Product Managers across a variety of industries on what they see as most important for ensuring mobile reliability, and gain a better understanding of what it takes to build scalable and secure mobile apps.

How Certifications Can Help You Land a Position | Hacking In to Cybersecurity

Linux Academy

Welcome to Hacking In to Cybersecurity, an all-new series dedicated to helping you, the reader, get a leg up on the competition when trying to break into the cybersecurity career field. The blogs will consist of introducing you to some techniques you can use to help to land a security position, as well as covering some concepts that anyone considering joining the career field should know about. How Hiring Managers Find the Best Candidates for a Cybersecurity Position.

Georgia bill could stifle the state’s booming cybersecurity community

The Parallax

A new bill winding its way through the Georgia state senate has cybersecurity experts on alert. As Senate Bill 315 is currently written, academics and independent security researchers alike could be subject to prosecution in Georgia alongside malicious hackers. Security researchers often need to access computers or networks without authorization, even if just to prove that they have dangerous vulnerabilities to patch.

Is ad fraud a cybersecurity problem?

The Parallax

Should chief information security officers at companies hit by ad fraud take a stronger role in stopping it? Taylor believes that at the very least, CISOs should use lessons from the cybersecurity world to encourage their employers to become more engaged with the ad fraud challenge.

Security vs Compliance | Hacking In To Cybersecurity

Linux Academy

Welcome back to another iteration of Hacking In To Cybersecurity! Our previous posts in this series have focused on informing you, the reader, on how to land a job in the cybersecurity career field , but we’re going to switch gears in this episode and talk about something that every security professional needs to understand: Does Compliance equal Security? Security Defined. Security vs Compliance. Security and Compliance Work Together.

Iterate Your Way to a Top Analytics Product Experience

Speaker: Richard Cheng, Associate Product Manager, Mark43

To fix traditionally paper-heavy and error-prone processes, they needed a secure and easy-to-use product experience that simplified and unified crime data collection and management. Mark43 is on a mission to bring public safety data management into the 21st century.