SIEM (Security Information and event Management) happens to be one of those infosec technologies that is discussed ad infinitum, yet the majority of those discussing the technology have trouble visualizing how SIEM can be an effective ally for
Come listen to a Case Study on RFID (proximity cards ) hacking by SARWAR JAHAN & ASHWATH KUMAR at the nullcon Informational Security Conference which will take place at Holiday Inn Resort, Goa, India from 28th of February to 4th of March 2017.
I wish I had lane change assist for those heavy traffic days, and I know I'll have it in my next car. And, much as the thought of a robotic chauffeur whisking me to work as I get a little more reading done appeals to me, it's not a future I want.
The reason cybersecurity is a process, not a one-time solution, is that the Bad Guys - whether careless or malicious employees, hacktivists, cybercriminals, or rogue governments (not to be confused with the good governments, which only spy on us for our benefit) - are a problem that will never go away. Come join the discussion!
One of the main arguments that should be touched by IoT discussion is cryptography. There is an undisputed consensus that cryptography is a mandatory requirement to preserve security and privacy in the IoT world, but we are far away for a general consensus on how to operate.
Technology providers and their customers are joining forces to advance a standard format for vendors to disclose cybersecurity vulnerabilities.
This post is part of a CityLab series on borders-both real and imagined-and what draws so many of us to places on the edge. On its face, a passport is little more than a booklet barely the size of a greeting card. Come join the discussion!
A domain Generating algorithm or the DGA as it is popularly known is a type of program that can help malware in getting new domains instantly whenever someone controlling the software demands. The algorithm became very famous after conficker started spreading.
Over the last several years, I've noticed the role of CIO transitioning increasingly to business experience rather than IT. Likewise, the CISO position is often given to those lacking any hard skills in security.