Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Travelex, one of the largest foreign exchange companies, the ones you see in almost every airport, has been brought to its knees by the Sodinokibi ransomware strain. Until recently, delivering the… → Read More
Cardinal Richelieu was a 16th-century French statesman who said that “if you give me six lines written...... → Read More
When it comes to hiring a CISO, firms get what they pay for. And they’ll have to live with the consequences when they try to be security misers. → Read More
Museum physical security incidents provide an excellent learning mechanism for information security teams. With that, I’d like to look at three major museum incidents and provide a lesson learned from each for information security professionals. → Read More
Last month David Bisson wrote a blog post 10 Must-Read Books for Information Security Professionals, where he asked information security professionals their must-read book. There’s a number of books listed there that are definitely worth a read. → Read More
In my previous piece I provided some insights on how Israel has become an information security innovation powerhouse. In closing the topic, I’ll share some insights from Gadi Tirosh who is a managing partner at Jerusalem Venture Partners (JVC); an international venture capital firm based in Jerusalem. → Read More
See how Israel has become a leading player in the worldwide information security sector. → Read More
When done well, the creation of an information security process catalog can provide significant benefits for an enterprise. → Read More
In this final piece, David Mundhenk and I will continue with some more detailed items on how to ensure PCI message queue compliance. → Read More
Going to RSA 2016? Failing to plan is planning to fail. → Read More
To queue or not to queue, that is the PCI question – part 2 by David Mundhenk and Ben Rothke → Read More
Here’s some of the most interesting firms I met with while at the CyberTech conference. → Read More
In the first of this three-part series, David Mundhenk and I will detail issues surrounding message queuing and how to ensure it doesn’t break your PCI DSS compliance effort. → Read More
I attended the Cybertech Conference & Exhibition in Tel Aviv. Now that I have caught my breath, here’s my account. → Read More
In this article, I’ll offer some practical advice on how physicians and others in healthcare can use social media without running afoul of their HIPAA compliance office. → Read More
A patient can post just about anything they want about a physician. But physician’s may be violating HIPAA if they reply to their patient via social media. → Read More
In his new book Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath, Ted Koppel offers a lot of doomsday scenarios, but not enough facts to ensure that this is placed in the non-fiction section. → Read More
In this 3-part series, I dealt with the issue of a shortage of people in the information security sector. In parts 1 & 2, I addressed why firms struggle to find quality information security staff. In this final segment, I’ll discuss how recruiters can help or hinder that, and get insights from noted information security recruiter Lee Kushner. → Read More
In part 1, I addressed why firms struggle to find quality information security staff. In this segment, I’ll discuss how recruitment can help or hinder that, and get insights from noted information security recruiter Tracy Lenzner. → Read More
While a CISO may get the glory; security architects are what most organizations need. → Read More