TechStrong Con

TechStrong Con Speaker Focus: Chenxi Wang, Rain Capital

The TechStrong Con virtual summit is less than a week away, and we’ve got a stellar lineup of speakers sure to hit the mark whether you’re into security, DevOps, DevSecOps, cloud-native … ...
Security Boulevard
TechStrong Con

Tech Rules. Let’s Celebrate – TechStrong Con

Celebrating the critical role technology plays in helping us all get through this pandemic and beyond On March 17, I was supposed to be marching up Fifth Avenue in the annual New ...
Security Boulevard
human

RSA Conference 2020: The Human Element is Alive and Well

Greetings from San Francisco, ground zero for RSA Conference, the annual security confab that is a must-attend for those in the cybersecurity sector. As usual, Security Boulevard and its parent company MediaOps ...
Security Boulevard
DevOps Chats: RSAC Innovation 2020, With Cecilia Marinier

DevOps Chats: RSAC Innovation 2020, With Cecilia Marinier

RSA Conference (#RSAC), in addition to being the world’s largest cybersecurity conference, has become the place to see the latest innovation in the world of cyber. The woman who drives the innovation ...
Security Boulevard

EC Council Coming to Capitol Technology University

November 14 and 15 Capitol Technology University is hosting a cybersecurity conference. [...] ...
US mayors agree to boycott future ransomware attacks following hacking spree on city systems

US mayors agree to boycott future ransomware attacks following hacking spree on city systems

Numerous big cities across the United States have fallen victim to ransomware attacks costing the municipalities tens of millions of dollars to recover. While some city administrators refrain from giving in to ...
UK Security BSides, Mark Your Calendar & Don't Miss Out

UK Security BSides, Mark Your Calendar & Don’t Miss Out

| | BSides, conference
BSides conferences are fantastic events for budding cyber and information security novices through to seasoned security professionals to learn, discuss the latest security challenges, network with peers and to make new contacts ...
Exploring botnets in VR

Exploring botnets in VR

By Asaf Nadler & Lior Lahav Botnets often use domain generation algorithms (DGAs) to select a domain name, which bots use to establish communication channels with their command and control servers (C2) ...

Speaking at Gartner Security Summit 2019

Gartner Security & Risk Management Summit 2019 is coming soon and here is my traditional blog post summarizing my speaking at this upcoming event (Washington, DC, June 17-20, 2019). “Outlook of Security ...
e-Crime & Cybersecurity Congress: Cloud Security Fundamentals

e-Crime & Cybersecurity Congress: Cloud Security Fundamentals

I was a panellist at the e-Crime & Cybersecurity Congress last week, the discussion was titled 'What's happening to your business? Cloud security, new business metrics and future risks and priorities for ...