Monday, September 23, 2019
Internet Storm Center Infocon Status

LATEST

SC Magazine

Ning Wang – Offensive Security

Ning WangCEO Offensive Security Why Nominated: Ning Wang is a rising star has worked to break the boundaries in the security industry, so that people can see that anyone is capable of starting a career in cybersecurity and advancing it –...
SC Magazine

Dani Martínez – IOActive

Dani MartínezSecurity ConsultantIOActive Why nominated: Dani Martínez proved to be a self-starter, beginning his career in IT he soon developed an interest in cybersecurity and began taking online courses in his spare time. Martínez also dove write in and began a cybersecurity blog...
SC Magazine

Maurice Stebila – Harman, a Samsung Company

Maurice StebilaDigital Security,Compliance and Privacy OfficerHarman, a Samsung Company Why nominated: Maurice Stebila has spent more than 30 years in the automotive, manufacturing and financial services industry supporting two of the world’s largest companies – EDS/General Motors and Harman by Samsung...
SC Magazine

Ed Adams – Security Innovation

Ed AdamsPresident and CEOSecurity Innovation Why Nominated: A highly respected veteran of the cybersecurity industry, Security Innovation CEO Ed Adams has taken on several new leadership roles in the year or so. Last April, he was named to board of directors of...
SC Magazine

David Archer – Galois

David ArcherPrincipal scientistGalois Why Nominated: Archer, an advocate for preserving privacy of data even when it’s used in decision-making both within the U.S. at all levels of government as well as internationally, directs research in privacy-preserving information technologies. Profile:  David Archer is all...
SC Magazine

Eve Maler – ForgeRock

Eve MalerVice PresidentInnovation & Emerging TechnologyForgeRock Why nominated: Eve Maler is a leading proponent on a variety of topics including from privacy and digital identity, security, privacy, and consent, with a focus on fostering successful ecosystems and individual empowerment. Maler drives...
SC Magazine

Rebecca Wynn – Matrix Medical Network

Rebecca WynnHead of Information Security & Data Protection OfficerMatrix Medical Network Why Nominated: Rebecca Wynn is responsible for fortifying Matrix Medical Network’s systems and data against increasingly sophisticated cyberattacks against health care providers, including data breaches, ransomware and IoT medical device...
SC Magazine

Laura Lee – Circadence Corporation

Laura LeeEVP, Rapid PrototypingCircadence Corporation Why Nominated:  Laura Lee, who manages rapid-prototype projects for experiential cybersecurity learning on the Circadence’s AI-powered platform Project Ares, brings an exceptional leadership record in the field of cyber exercises and training, previously directing the research and development...
SC Magazine

Andrew van der Stock – Synopsys

Andrew van der StockSenior Principal ConsultantSynopsys Why nominated: A 20-year veteran Andrew van der Stock is a senior principal consultant at Synopsys, providing technical leadership in security architecture, threat modeling, secure coding guidelines and reviews, assurance and penetration...
SC Magazine

Yatia Hopkins – eSentire

Yatia HopkinsSolutions EngineeringTeam LeadeSentire Why nominated: Yatia Hopkins brings the mentoring skills she honed as lead of eSentire’s Solutions Engineering team to Yeshiva University’s MS in Cybersecurity program. A frequent participant in women’s career organizations, Hopkins is committed to making...
SC Magazine

Adam Isles – The Chertoff Group

Adam IslesPrincipalThe Chertoff Group Why Nominated: Adam Isles, who has held leadership positions in the U.S. Department of Homeland Security, Department of Justice, National Security Council and Raytheon before joining The Chertoff Group, is a senior associate (non- resident)...
SC Magazine

Ken Underhill – Cybrary

Ken UnderhillMaster InstructorCybrary Why nominated: Ken Underhill primary mission is to be a hands on instructor using live and online cybersecurity classes to enable students to attend his classes worldwide. This is part of his core belief than people...
SecurityWeek

Being CISO Is No Longer a Dead-End Job

A decade ago, being named as CISO was considered the highest rung achievable from within the security function. This is changing, driven by increasing cyber awareness in the boardroom, the embedding of cyber risk in every part of the...
SC Magazine

Ellison Anne Williams – Enveil

Ellison Anne WilliamsFounder & CEOEnveil Why Nominated: Starting a company has been Ellison Anne’s dream since she was young and the success of Enveil shows her determination and technical expertise – and innovation in securing data while it’s being used or processed. She...
SC Magazine

Kabir Barday – OneTrust

Kabir BardayChief Executive OfficerOneTrust Why nominated: While many people fear privacy regulation could be a detriment to innovation, Kabir Barday takes the opposite approach and views directives like GDPR and the upcoming California Consumer Privacy Act as an opportunity for a...
SC Magazine

Abhishek Singh – Prismo Systems

Abhishek SinghChief ResearcherPrismo Systems Why nominated: Abhishek Singh has played a crucial role in the development of sophisticated cybersecurity technologies and processes, including real-time analysis via virtual machines, deception-based techniques, and intrusion prevention and detection. This past year, his research to detect...
Computerworld

iOS 13: Apple’s big BYOD improvements help enterprise pros

Apple may place much of its focus on Apple Arcade and consumer-friendly iPad/iPhone features, but there are numerous enterprise-focused enhancements wrapped up inside iOS 13.The BYOD enterprise The company’s latest operating systems introduce a host of productivity-enhancing upgrades, particularly for...
Graham Cluley

I’m keynoting about cybercrime at the CRN MSP conference in London next week

I’m the opening keynote speaker at CRN’s MSP conference in London next week, where – amongst other things – I’ll be describing to managed service providers how it’s possible to make a billion dollars through cybercrime. I hope to see...
ZDNet

New North Korean malware targeting ATMs spotted in India

Another version of the same malware, but with RAT-like features, spotted targeting Indian research centers.
IBM Security

iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps

Apple users of the world, 13 is your lucky number: iOS 13 has arrived! As expected, this new iteration of Apple’s mobile operating system comes with a slew of changes, both consumer-focused and enterprise-grade. How will iOS 13 impact your...

How Network Logging Mitigates Legal Risk

Logging that is turned on, captured, and preserved immediately after a cyber event is proof positive that personal data didn't fall into the hands of a cybercriminal.
TechRepublic

How to use the new Firefox Private Network

Need to hide your location and encrypt your Firefox browser data? Look no further than the new Firefox Private Network add-on.
SecurityWeek

Use Case-Centric Threat Intelligence Requires a Considered Approach

One of the most promising developments I’ve seen in threat intelligence over the last year or so is a greater emphasis on use cases. read more
The Register

HMRC’s HTTPS howler: Childcare payments site cert expired at 1am on Sunday, down for hours

Gov.uk portal finally lurched back to life after lunch Furious parents have lashed out at Her Majesty's Revenue and Customs after the UK tax authority let a key HTTPS certificate expire on its childcare tax credit portal.…
IBM Security

What Is Unified Threat Management? A Pragmatic Approach to Information Security

Organizations are spending on cybersecurity, but threat vectors continue to outpace corporate outlay. As noted by Tech Genix, 2019 will see a rise in everything from cryptojacking attacks and supply chain compromises, to the misuse of biometric data and...
587FollowersFollow

LEADERS

Graham Cluley

I’m keynoting about cybercrime at the CRN MSP conference in London next week

I’m the opening keynote speaker at CRN’s MSP conference in London next week, where – amongst other things – I’ll be describing to managed service providers how it’s possible to make a billion dollars through cybercrime. I hope to see...
Bruce Schneier

France Outlines Its Approach to Cyberwar

In a document published earlier this month (in French), France described the legal framework in which it will conduct cyberwar operations. Lukasz Olejnik explains what it means, and it's worth reading.
Bruce Schneier

Friday Squid Blogging: Piglet Squid

Another piglet squid video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.
Bruce Schneier

Crown Sterling Claims to Factor RSA Keylengths First Factored Twenty Years Ago

Earlier this month I made fun of a company called Crown-Sterling, for...for...for being a company that deserves being made fun of. This morning, the company announced that they "decrypted two 256-bit asymmetric public keys in approximately 50 seconds from a...
Bruce Schneier

A Feminist Take on Information Privacy

Maria Farrell has a really interesting framing of information/device privacy: What our smartphones and relationship abusers share is that they both exert power over us in a world shaped to tip the balance in their favour, and they both work...