How machine learning impacts information security

O'Reilly Media - Ideas

Burt and cybersecurity pioneer Daniel Geer recently released a must-read white paper (“Flat Light”) that provides a great framework for how to think about information security in the age of big data and AI. Continue reading How machine learning impacts information security

31 cybersecurity stats that matter

TechBeacon

Enterprise organizations have a lot to deal with these days on the cybersecurity front. Security, Information Security, Information Security (Info Sec

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Meet Boston’s First Chief Information Security Officer

Sailpoint

Walsh announced Greg McCarthy’s appointment as the city’s first chief information security officer (CISO). McCarthy will lead the cybersecurity team within the Department of Innovation and Technology. I started as a project manager and was the second person on the security team.

5 ways to attract the best information security pros

TechBeacon

Security, Information Security, Special Coverage: RSA Conference 2020, RSA Conference, CareersRSA Conference 2020 was focused on the human element for the first time, and thankfully so.

The Essential Guide to Building Analytic Applications

Embedding dashboards, reports, and analytics in an existing application presents some unique opportunities—and poses unique challenges—to software teams. Download this eBook to hear 16 product experts share insights on business intelligence, UI/UX, security, and everything that goes into building a successful application with analytics at its core.

K-12 Data Security Tips from PowerSchool’s Chief Information Security Officer

PowerSchool

By Rich Gay, Chief Information Security Officer & VP of Development , PowerSchool . No school or district can be 100 percent safe from cybersecurity attacks. Las t year alone, there were 122 data security incidents reported at K-12 schools, according to a recent report by the K-12 Cybersecurity Resource Center. The good news is that there are many ways to be proactive and secure your student and staff information.

Cybersecurity Q&A with Dave Elfering, VP information security at Werner Enterprises

Sailpoint

Dave Elfering, currently Vice President of information security has also witnessed a considerable amount of growth and change over his career when it comes to information security. In 1997, Elfering began working at Werner as a project manager to help the company build its online presence and secure its data. Tell us how you got interested and eventually started in information security? I started writing a lot of security policies.

How to End the War Between Information Security and IT Operations

The New Stack

Currently leading Puppet’s interest in helping DevOps teams with secure digital transformations by automating away mundane parts of work, freeing humans and computers to both do what they are good at. All of these barriers can understandably cause friction between security and IT operations.

Cybersecurity Awareness Month: Is it time to review your approach?

TechBeacon

For most folks, October is a month for ghosts and goblins, but for the last 15 years the Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA) have had a different emphasis: National Cybersecurity Awareness Month (NCAM).

75

Why health care cybersecurity is in ‘critical condition’

The Parallax

government-sponsored Health Care Industry Cybersecurity Task Force delivered more than 100 recommendations to the Department of Homeland Security to make medical technology more resistant to hackers. READ MORE FROM ‘NO PANACEA FOR MEDICAL CYBERSECURITY’.

How to Package and Price Embedded Analytics

With this approach, you turn features off and on through visibility controls, conditional logic, and your application’s security model. You need to be able to use your existing security. leveraging adaptive security models >. security • Dashboards • Widgets • Pages • Tables.

AI and cybersecurity: 3 things your team needs to know

TechBeacon

Security, Information Security, Predictive Analytics

IoT 69

Georgia bill could stifle the state’s booming cybersecurity community

The Parallax

A new bill winding its way through the Georgia state senate has cybersecurity experts on alert. As Senate Bill 315 is currently written, academics and independent security researchers alike could be subject to prosecution in Georgia alongside malicious hackers.

Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met. ”—Jacki Monson, chief privacy and information security officer, Sutter Health. READ MORE ON MEDICAL SECURITY.

Netflix Information Security: Preventing Credential Compromise in AWS

Netflix TechBlog

Today, we would like to share two additional layers of security: API enforcement and metadata protection. For more information on how the AWS services mentioned work, see the Background section at the end of this post. cloud-computing netflixsecurity security cloud-security aws

AWS 114

5 Early Indicators Your Embedded Analytics Will Fail

application admins say it’s a pain to manage security settings in two different places.” When we need to update the information in the dashboard, we don’t like having to leave. Updating your application’s dashboards and reporting features. may feel optional—until suddenly it’s not.

Q&A with John Masserini, Chief Information Security Officer at Millicom

Sailpoint

In this Q&A we spoke with John Masserini, chief information security officer at international telecommunications provider Millicom. Masserini talks with us about his interesting career path in information security, cloud security, and identity management.

9 disruptive security plays from RSAC 2019

TechBeacon

Bad actors have always had the edge in cybersecurity. After all, the good guys have to secure everything, while the bad guys need find only one vulnerability. Security, Information Security, Information Security (Info Sec), Special Coverage: RSA Conference 2019

Is Information Security the Right Profession for Me?

Linux Academy

Wondering if information security is the right profession for you? I’ve been working in information security for many years and have had the opportunity to fill a variety of roles. First off, there are many different jobs within information security.

United We Stand: Support for Coalfire Consultants and The Information Security Community

SecureWorks

United We Stand: Support for Coalfire Consultants and The Information Security Community Recent events have broad implications for penetration testing, potentially making organizations more vulnerable to legitimate criminals. Recent events have broad implications for penetration testing, potentially making organizations more vulnerable to legitimate criminals. Threats & Defenses Leadership

Why “Build or Buy?” Is the Wrong Question for Analytics

What’s more, they gain the security of working with. informed decisions. workflows and security models. WHY “BUILD OR BUY?” IS THE WRONG QUESTION FOR ANALYTICS Introduction.1 When to Build Your Own Analytics. 2 When to Buy a Bolt-On Solution. 6 When to Take a Combined Approach.

RSA 2019: Tracking the state of cybersecurity

TechBeacon

Next week, more than 40,000 members of the security community will arrive in San Francisco to attend the annual RSA Conference, now in its 27th year. Security, Information Security, RSA Conference 2019, Information Security (Info Sec), DevOps Security, Application Security (App Sec There, they will find a smorgasbord of speakers, sessions, and an expo where hundreds of companies will be displaying their wares.

Cybersecurity Style Guide helps you write like a hacker

The Parallax

The Bishop Fox Cybersecurity Style Guide , published last week , was developed over the last year and a half to fill a vacuum, says its lead editor, Brianne Hughes. My real goal was to bridge the gap between people who are writing in security, and the people who have to read that.”.

Cybersecurity On Call: Balancing Connectivity and Cybersecurity with Paul Roberts

Cloudera

LockState learned a hard lesson around cyber and IoT security –as well as customer trust. To learn more about how the industry is balancing connectivity with cybersecurity, we have invited Paul Roberts to join us. Paul is the founder and Editor in Chief of The Security Ledger, an independent security news website that explores the intersection of cyber security with the Internet of Things.

Abandoned mobile apps, domain names raise information security risks

Kacy Zurkus - CSO Online

The apps can still contact custom domain names for arbitrary tasks like configuration changes, application updates or publishing information. The traffic from a mobile device that is still trying to connect to an old and expired domain exposes lots of personal information — contact data, text messages, pictures, GPS data and call logs all sitting at risk of an attack.

The Definitive Guide to Creating a Reliable Mobile App

Hear from Product Managers across a variety of industries on what they see as most important for ensuring mobile reliability, and gain a better understanding of what it takes to build scalable and secure mobile apps.

When machine learning is hacked: 4 lessons from Cylance

TechBeacon

Artificial intelligence (AI) has become all the rage in cybersecurity circles, but a recently discovered universal bypass of a machine-learning (ML) algorithm in BlackBerry's Cylance cybersecurity suite offers some valuable lessons for organizations mulling AI security solutions.

How hackers are approaching medical cybersecurity

The Parallax

READ MORE ON MEDICAL CYBERSECURITY. Dr. Paul Pugsley’s medical cybersecurity crisis in the Emergency Room was part of a simulation at the CyberMed Summit 2018 to teach doctors about complications that can arise from cyberattacks against medical devices and hospitals.

The rise of cyber security product sprawl

DXC

Twenty years ago, when enterprise information security was starting to hit its stride, nearly all enterprise security software products were bought as point solutions. But over time the number of tools in the security practitioner’s toolbox grew […]. Security CISO enterprise cybersecurity

Getting Started with Cloudera’s Cybersecurity Solution

Cloudera Engineering

A quick conversation with most Chief Information Security Officers (CISOs) reveals they understand they need to modernize their security architecture and the correct answer is to adopt a machine learning and analytics platform as a fundamental and durable part of their data strategy.

Iterate Your Way to a Top Analytics Product Experience

Speaker: Richard Cheng, Associate Product Manager, Mark43

To fix traditionally paper-heavy and error-prone processes, they needed a secure and easy-to-use product experience that simplified and unified crime data collection and management. Mark43 is on a mission to bring public safety data management into the 21st century.

How Certifications Can Help You Land a Position | Hacking In to Cybersecurity

Linux Academy

Welcome to Hacking In to Cybersecurity, an all-new series dedicated to helping you, the reader, get a leg up on the competition when trying to break into the cybersecurity career field. The blogs will consist of introducing you to some techniques you can use to help to land a security position, as well as covering some concepts that anyone considering joining the career field should know about. How Hiring Managers Find the Best Candidates for a Cybersecurity Position.

6 cybersecurity trends we’re thankful for

The Parallax

You might think of cybersecurity professionals as tech’s collective “ watchers on the wall ”—the guardians who let you know when doom is coming. Here are six things on the cybersecurity and privacy front we’re glad that organizations are helping consumers become more aware of than ever before.

Trends 207

Security vs Compliance | Hacking In To Cybersecurity

Linux Academy

Welcome back to another iteration of Hacking In To Cybersecurity! Our previous posts in this series have focused on informing you, the reader, on how to land a job in the cybersecurity career field , but we’re going to switch gears in this episode and talk about something that every security professional needs to understand: Does Compliance equal Security? Security Defined. Security vs Compliance. Security and Compliance Work Together.

4 ways to build a better security culture

TechBeacon

While the vast majority of security professionals believe a stronger cybersecurity culture would improve their business, nearly all companies—95%—have a gap between their desired culture and reality, according to new research. Security, Information Security, Information Security (Info Sec

The Product Dev Conundrum: To Build or Buy in a Digital World?

Speaker: Mark Ridley, Owner and Founder, Ridley Industries

Any PM or technical leader who’s led the charge of building a digital product knows that product engineering is one of the most expensive elements of business. In most cases, actually building software should be the last avenue that companies explore to deliver great products, as software engineering, data science and product development are complex, uncertain and hard to manage.

Cybersecurity on Call: Nation-State Cyber Operations with Patrick Tucker

Cloudera

If you enjoyed this podcast, click here to hear other cybersecurity industry influencers on their take on the latest trends. Like us on SoundCloud and follow us so you’re always up on current events in the world of cybersecurity. The post Cybersecurity on Call: Nation-State Cyber Operations with Patrick Tucker appeared first on Cloudera Blog.