Profile

Cover photo
Infosecurity Magazine
Worked at Infosecurity
Lives in London, UK
823 followers|425,694 views
AboutPostsVideos+1's

Stream

Infosecurity Magazine

Shared publicly  - 
 
Join us Live tomorrow at 2pm BST for a panel-discussion with top speakers:
-Cesare Garlati Chief Security Strategist, PRPL Foundation
-Rob Bamforth Principal Analyst, Quocirca
-Jon Fielding EMEA sales director, Imation
-Ed Moyle Director of Emerging Business and Technology, ISACA
1
Add a comment...

Infosecurity Magazine

Infosec\Cybersecurity  - 
 
87% of respondents think that large financial hacks are happening more often than reported, and right under the nose of security auditors... by Tara Seal
3
2
Shraboni Dey's profile photoUli Krosse's profile photo
Add a comment...

Infosecurity Magazine

Shared publicly  - 
 
Click-Fraud Campaigns Could Lead to CryptoWall
1
Add a comment...

Infosecurity Magazine

Shared publicly  - 
 
Security Alert as Flash Flaw Found in Popular Exploit Kit
1
Add a comment...

Infosecurity Magazine

Shared publicly  - 
 
Chinese targeted attack group has been infecting users via phishing emails
2
1
TheVideoPod's profile photo
Add a comment...

Infosecurity Magazine

Shared publicly  - 
 
A CIA-backed firm has found exposures of log-in credentials for 47 United States government agencies across 89 unique domains
1
2
TheVideoPod's profile photoAngelo “ky4n63l” Ciampa's profile photo
Add a comment...
In their circles
316 people
Have them in circles
823 people
Denver Davido's profile photo
AdaptiveMobile's profile photo
Katja Hahn's profile photo
Bastien Verdier's profile photo
Product Reviews and Reports's profile photo
Ravi kumar's profile photo
ShitCtrl Del's profile photo
True Patriot's profile photo
Jan Lie Børsheim's profile photo

Infosecurity Magazine

Shared publicly  - 
 
All workplaces share the same security threat: the well-meaning but careless employee who may be more focused on productivity than protecting the company’s sensitive or confidential information. Often, without thinking of the potential consequences, they leave confidential documents in plain view, share passwords, circumvent security procedures and transfer sensitive data to the public cloud without company approval – ultimately costing much more to your organization’s bottom line than the employee hoped to save in time. IT professionals agree that more security incidents are caused by negligence than malicious acts.

In this webinar, Dr Larry Ponemon of the Ponemon Institute and Michael Crouse, Director of Insider Threat Strategies, Raytheon | Websense, will discuss findings of the 2015 survey The Unintentional Insider Risk in the United States and German Organizations.

Topics for discussion include:  

How much unintentional security incidents are costing your organization 
Which employees are most likely to cause an unintentional insider breach 
What you can do about it

Speakers:
Michael Crouse
Joe O'Halloran Editor & Publisher, Infosecurity Magazine
Larry Ponemon Chairman and Founder, Ponemon Institute 
Webinar: Addressing the Security Risks of Negligent Insiders
Thu, July 30, 1:00 PM
https://goo.gl/ETm1zs

1
Add a comment...

Infosecurity Magazine

Shared publicly  - 
 
London researchers find IPv6 leakage and DNS hijacking flaws
1
1
Javier Hernan Gomez's profile photo
Add a comment...

Infosecurity Magazine

Shared publicly  - 
 
Europol Leads Crackdown on Air Ticket Fraud
3
1
Cyrus Ramirez's profile photo
Add a comment...

Infosecurity Magazine

Shared publicly  - 
 
#Webinar Cost reductions and efficiency drives are the order of the day for all businesses but how can your firm carry this out without impacting employee productivity or compromising your data security?
1
1
Randy Gonzalez's profile photo
Add a comment...

Infosecurity Magazine

Shared publicly  - 
 
Web and mobile applications used by government organizations are more likely than those in other industries to fail standard security policies
1
1
TheVideoPod's profile photo
Add a comment...

Infosecurity Magazine

Shared publicly  - 
 
Join us for today’s panel-discussion webinar, topics include:
* Reducing attacker ‘dwell time’ on the network
* The diversification of enterprise IT, and the increase in threat vectors
* Updating legacy processes
* Reducing attacker ‘dwell time’ on the network
* Effective monitoring of egress traffic
* Holistic data collection and processing
1
Add a comment...
People
In their circles
316 people
Have them in circles
823 people
Denver Davido's profile photo
AdaptiveMobile's profile photo
Katja Hahn's profile photo
Bastien Verdier's profile photo
Product Reviews and Reports's profile photo
Ravi kumar's profile photo
ShitCtrl Del's profile photo
True Patriot's profile photo
Jan Lie Børsheim's profile photo
Work
Employment
  • Infosecurity
Story
Tagline
Dedicated to Serving the Information Security Community; In Person, In Print, Online
Introduction

Infosecurity Magazine has almost ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features both online and in print that focus on hot topics and trends, in-depth news analysis and opinion columns from industry experts.

Infosecurity Magazine also provides free educational content, endorsed by all major industry accreditation bodies and is therefore considered a key learning resource for industry professionals.

 
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
London, UK
Infosecurity Magazine's +1's are the things they like, agree with, or want to recommend.