Security Boulevard’s 5 Most Read Stories for the Week, May 28-Jun 1

A new week, a new crop of security stories. Last week, the “fifth generation of cybersecurity,” the U.S government’s “moonshot” cybersecurity project, the case of Black Cube and GDPR compliance for mobile devices all made the headlines. We also launched the new CISO Conversations podcast series with Mike Johnson and David Spark.

Moonshot Information Security Project

The Moonshot Information Security Project

Recently, I was reading about the U.S. government considering funding a “moonshot” information security project—that is, like the efforts in the 1960s to reach the moon (before the Soviets), abandon incrementalism in information security and try the impossible (or nearly so.) So, this is where the audience participation part of ...
The Case of Black Cube

Incompetent Intelligence: The Case of Black Cube

Stand in the center of the capital city of your choice and throw a stone. Odds are, your stone will land in proximity to any of the hundreds of firms whose shingle reads, “Intelligence Contractor.”When you encounter a competent group, you hardly know they are there, such is their adroit ...
Introducing the CISO/Security Vendor Relationship Podcast with Mike Johnson and David Spark

Introducing the CISO/Security Vendor Relationship Podcast with Mike Johnson and David Spark

I’m proud and excited to announce the launch of the CISO/Security Vendor Relationship Podcast based on the series of articles and videos I produced that examine the relationship between security buyers and sellers. That series was heavily inspired by the writings, posts and insane engagement that Mike Johnson, CISO of ...
Mobile Devices for GDPR Compliance

Organizations Are Overlooking Mobile Devices for GDPR Compliance

The dawn of the European Union General Data Protection Regulation (GDPR) is upon us, but organizations are overlooking the risk of mobile devices. The cost for non-compliance is steep. For example, if the Equifax breach occurred under GDPR, it is estimated that its fine would have been more than $120 ...
Fifth Generation of Cybersecurity

Check Point: Time for a Fifth Generation of Cybersecurity

Cybersecurity is entering a new phase that requires IT organizations to put processes in place that are capable of continuously identifying potential threats before they impact operations and detecting them once a breach occurs.Don Meyer, head of marketing for data center at Check Point Software Technologies, said that shift represents ...
You may also like

Be sure to check Security Boulevard daily for the latest in security news, updates and features worth noting.

Featured eBook
451 Research: Securing Open Source

451 Research: Securing Open Source

In this report, we look at how the boom in OSS adoption has also led to an increase in awareness of open source risks, from licensing issues to security – and the measures required to protect organizations against those risks. We examine two incidents in particular – the Heartbleed vulnerability and the 2017 Equifax data ... Read More
Saleem Padani

Saleem Padani

Saleem is a highly accomplished business, marketing and technology leader with track-record of success in startups, mid-size and large technology and professional services organizations, currently the COO at MediaOps, Worldwide Program Director & Technical Evangelist at IBM, Director of Industry Solutions at Neuvis, Co-founder & Vice President of LexiBridge and Senior Software Architect at DataEase International. Saleem has passion for leading and empowering global teams to drive new initiatives, leveraging broad & deep business, strategic, marketing, technical and solution delivery skills. Saleem has an Executive M.B.A, from University of Texas at Dallas, Master’s and Bachelor’s Degree in Computer Engineering.

saleem has 22 posts and counting.See all posts by saleem