Identify and protect your “very attacked people” as attackers look for high value targets
#Infosec19: Complex Legacy IT Problems Can’t Be Solved with Simple Solutions
The business is key to defining the most critical systems to secure
#Infosec19: Former Lloyd’s CEO Says Collaboration is Key to Future of Cyber Insurance
Inga Beale says industry needs more data to offer better products
#Infosec19: Security Must Support Digital Transformation & Enable the Business
Security pros must understand what digital transformation means for the business
#Infosec19: Smart Home Ads Could Threaten Democracy
Jamie Bartlett argues secretive political advertising should be made public
#Infosec19: CISOs Should Remember to KISS in Board Meetings
Leading CISO explains the art of simplicity in presentations to business leaders
#Infosec19 Enable Visibility into App Development for Vulnerability Managment
“Pushing left doesn’t fix this, you need to push right too”
Identifying Vulnerabilities in Phishing Kits
While recently examining hundreds of phishing kits for ongoing research, Akamai discovered something interesting – several of the kits included basic vulnerabilities due to flimsy construction or reliance on outdated open source code. Considering the i…
#Infosec19: Winners of European Security Blogger Awards Announced
The results of the 2019 European Security Blogger Awards have been announced
Ex-NSA Hacker Reviewed by FEC over Software Contribution Offer
Area 1 Security wants to contribute free spear-phising prevention software to political campaigns.