Remove 2014 Remove Programming Remove Security
article thumbnail

Planbox Achieves ISO 27001, 27017 and 27018 Information Security Certification

Planbox

Planbox becomes compliant with the highest international information security standards. With these certifications, customers can be assured that Planbox has implemented the necessary systems and processes for the ongoing protection of their information.

Agile 62
article thumbnail

Secured by Women: Meet Rinki Sethi, VP and CISO at BILL

Lacework

Women’s representation in cybersecurity has come a long way in the last decade, but we still have progress to make before the balance truly shifts. That’s exactly why Lacework launched Secured by Women last year; and now, we’re thrilled to be back to continue championing the incredible women making a difference in cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: Malicious Versions of Cobalt Strike Taken Down, While Microsoft Notifies More Orgs About Midnight Blizzard Email Breach

Tenable

Fortra has released a new Cobalt Strike version with enhanced security features, according to the NCA. In June, Microsoft President Brad Smith faced tough questions during his testimony before the House of Representatives’ Homeland Security Committee, which scheduled the hearing after a U.S. as well as private sector organizations.

article thumbnail

IT leaders uplift women to fill tech talent gaps

CIO

Her pitch laid the groundwork for a pilot program in which Gusto covered the cost of a seven-month, full-time bootcamp while continuing to pay McGrath a salary and maintain her benefits and vesting. I had seen others leave to learn software engineering and not come back, which is why we advocated for this program.”.

article thumbnail

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Tenable

Check out what’s new in NIST’s makeover of its Cybersecurity Framework. Also, how to assess the cybersecurity capabilities of a generative AI LLM. 1 - NIST’s Cybersecurity Framework 2.0 1 - NIST’s Cybersecurity Framework 2.0 came out in 2014. The Cybersecurity Framework at 10.and And much more!

article thumbnail

Even North Korea has an antivirus program—but it’s used for spying

The Parallax

The process that led to this discovery, publicly revealed on Tuesday, began in July 2014 , when a pseudonymous source sent SiliVaccine 4.0 READ MORE ON SECURITY AND GEOPOLITICS. to the journalist Martyn Williams , who specializes in reporting on North Korean technology. China evaluates vulnerabilities for attacks before disclosure.

Spyware 187
article thumbnail

Security Innovation Network Innovation Summit 17 July 2014 in NYC

CTOvision

We have written before about the Security Innovation Network ( SINET ). This post provides some additional information on a 17 July 2014 session they have pulled together in NYC, one that I believe will help the community collectively tackle some key issues. Here is more from the event site : Innovation Summit 2014.