When it comes to the best security events to attend, they are in fact not information security events at all… And these are the Industry conferences
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
Social engineering is one of the most common forms of con artistry – manipulating another person during what seems like a normal interaction
WordPress, a popular platform for developers, has once again become the talk of the IT town due to its unencrypted cookies.
I’ve been fortunate to find many events that I keep going back to. Of those, my favorite yearly event is easily ShmooCon.
According to Wikipedia, encryption “has long been used by the military and governments to facilitate secret communication.
But EMV security doesn’t work as well for online transactions, where most of those are made in the United States.
I have attended multiple information security events all over the world, including those I managed in my time as the Chair
Give up giving up, because giving up is not an option. Re-do your risk assessments, re-map your adversaries and keep trying to improve.
Just as one takes some level of risk when seeking a romantic relationship—clubbing, speed dating or online dating—people put themselves out there
The risk to information is clear: integrated and secure customer data is vital for business effectiveness, the quality of customer service and reputation