Monday, January 24, 2022

Rethinking Compliance with Igor Volovich

Igor Volovich has built a career as a global CISO, strategist, advisor, author, speaker, and global cybersecurity leader with 20+ years of service to the world’s largest private and public-sector entities, Fortune 100 firms, and US policy, legislative, and...

Escape from the Echo Chamber with Regina Bluman

Regina Bluman is an infosec professional who previously worked in IT Marketing for almost a decade, before leaving the dark side and moving across! She is an experienced panelist, guest author, podcast guest, and was recently nominated as ‘Technical...

Responsible Cyber with Magda Chelly

Dr. Magda Chelly is a keynote speaker, serial entrepreneur and a senior security expert.She is a strong activist for women in security, and founded Women on Cyber in Singapore, which is focused on supporting female professionals in the industry.She’s...

Alien Invasion with Sherri Davidoff

The US government and military have recently confirmed investigations and sightings of UFOs, reigniting the phenomenon of aliens among us. Ironically, an unidentified spaceship descends into BarCode, and official contact is made.Sherri Davidoff is the CEO of LMG Security...

Virtual Pickpocket with Timur Yunusov

In recent years, there has been significant consumer demand for instant payments through their mobile phones. Unfortunately, the security aspect of mobile NFC payments has been ignored and mobile wallet theft is real threat.Timur Yunusov is a Security Expert...

Cyber Crisis with Dr. Eric Cole (REVISITED)

At this moment, more than 70% of us are currently compromised by cybersecurity attacks that we underplay, ignore, or simply aren’t aware of because of their hyper-stealthy and invisible nature. In fact, most individuals and businesses will have been...

StopLoss with Greg Edwards

Predicted to be a $20 Billion cybercrime empire by the end of 2021, Ransomware is impacting businesses like never before… resulting in loss of revenue, reputation, and resources for organizations of all types. To put things in perspective, it...

Zero Proof with John Kindervag

Organizations are increasingly adopting a Zero Trust model, which is based on the philosophy that there should be no implicit trust in a corporate network. Rooted in the principle of “Never Trust, Always Verify”, Zero Trust is designed to...

Fuel Injector with Joseph Schorr

Engines require three vital elements to generate power: AIR, SPARK, and FUEL. If any of these three elements aren’t present, the engine will struggle to function or even start. Fuel injectors are a vital part of a complex system...

Face Off Part II with Sophie Zhang

A former data scientist at Facebook, Sophie Zhang was tasked with investigating “fake engagements” although instead, discovered global political manipulation and opposition haassment in 25 countries. She was fired from Facebook in September 2020, after declining a $64,000 severance...

Face Off Part I with Sophie Zhang

A former data scientist at Facebook, Sophie Zhang was tasked with investigating “fake engagements” although instead, discovered global political manipulation and opposition haassment in 25 countries. She was fired from Facebook in September 2020, after declining a $64,000 severance...

Nucleus with Scott Kuffer (REVISITED)

nu·cle·us /n/ : the central and most important part of an object, movement, or group, forming the basis for its activity and growth. Having a nucleus to your Threat and Vulnerability Management Program is critical, as well as having an...

CMMC Clockwork with Jacob Horne

Jacob Horne is the Managing Director at DEFCERT where he specializes in DFARS and CMMC level three compliance for manufacturers in the Defense Industrial Base. As a former NSA intelligence analyst and U.S. Navy cryptologic technician, Jacob has over...

Cybersecure Investment with William Lin

William Lin became an avid technology enthusiast after building his very first computer in elementary school and then began experimenting with the latest venture-backed consumer business models in his spare time. He is now Managing Director and a founding...

Synpuppet Master with Dr. Matthew Canham

Dr. Matthew Canham is the CEO of Beyond Layer 7 (a cybersecurity consulting firm specializing in human security and data analytics), and a Research Professor of Cybersecurity at the Institute of Simulation and Training, University of Central Florida. Previously,...

Linux Servers at Risk of RCE Due to Critical CWP Bugs

The two flaws in Control Web Panel – a popular web hosting management software used by 200K+ servers – allow code execution as root on Linux servers.

AT&T announces multi-gigabit fiber: $110 a month for 2Gbps, $180 for 5Gbps

Enlarge (credit: Getty Images | zf L) AT&T has started offering 2Gbps and 5Gbps symmetrical Internet speeds over its fiber-to-the-home network, the telecom company announced today. The multi-gigabit speeds are...

Registration for the (ISC)² Entry-Level Cybersecurity Certification Exam Pilot Program Is Now Open

New certification validates students' and career changers' foundational skills and helps kickstart their cybersecurity careers.
SecurityWeek

DC, 3 States Sue Google Saying it Invades Users' Privacy

The District of Columbia and three states are suing Google for allegedly deceiving consumers and invading their privacy by making it nearly impossible for them to stop their location from being tracked. read more
Security Affairs

A flaw in Rust Programming language could allow to delete files and directories

The maintainers of the Rust programming language fixed a high-severity flaw that could allow attackers to delete files and directories from a vulnerable system. The maintainers of the Rust programming language have released a security update for a high-severity...