For developer and AppSec teams alike, securing critical components of the software supply chain, including open source libraries, container images, cloud infrastructure, and developer tools, is ...
This week, the cybersecurity industry's most basic assumptions under scrutiny. Following up our conversation with Wolfgang Goerlich, where he questions the value of phishing simulations, we ...
Chief Technologist and Senior Director of Programs at CyberRisk Collaborative CEO at Computer Coach Training Center Suzanne Ricci, CEO at Computer Coach Training Center is an award-winning career ...
Olivia Rose is an award-winning Cybersecurity leader and three-time global Chief Information Security Officer (CISO). Olivia Rose is the founder of the Rose CISO Group (www.rosecisogroup.com), a ...
With two IPOs & eight acquisitions, Brian has helped build some of the most successful security companies in the world. He has over 25 years in the security industry as a security company ...
As the VP of CISO Memberships for the CyberRisk Collaborative Accelerator, Tom enjoys sharing awareness of all the resources the CRA provides, including the Acclerator Program. Tom has been ...
Neko Papez has a background in cybersecurity strategy, product marketing, account management, account development, and sales. With experience at leading enterprise security and big data analytics ...
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots ...
Whitney Young is a Solutions Engineering Manager at Tines. Since joining in April 2022, her role focuses on supporting teams in their evaluation of Tines, a smart, secure workflow platform ...
Well over 20 years in cybersecurity (& IT). Most of that spent in consulting and managed security services (MSSP/MDR). I’ve worked or led most parts of that business from service delivery ...
George Prichici is the VP of Product Management at OPSWAT, responsible for its Application Security Solutions. George’s background in technology spans over 15 years, in both product management ...
The attacks require about $11,000 worth of equipment and a sophisticated understanding of electrical and cryptographic engineering. The difficulty of the attack means it would likely be carried ...