Top 8 Benefits of a Remote Internship at LogRhythm

Remote internships can provide a wide range of benefits. Whether you’re a current student or a recent graduate, an internship gives you the chance to apply your skills, advance your career, and try new things. A remote internship may seem…
The post Top… Continue reading Top 8 Benefits of a Remote Internship at LogRhythm

IWD: biometrics, machine learning, privacy and being a woman in tech – Naked Security Podcast

To celebrate International Women’s Day we invite you to this all-female splinter episode. Continue reading IWD: biometrics, machine learning, privacy and being a woman in tech – Naked Security Podcast

Women in Cybersecurity No Longer an ‘Anomaly’

Truth be told, there are many women in cybersecurity who are tired of talking about women in the industry as if they are anomalies. For many female professionals, it’s far past the time for the narrative to change. Rather than be seen as a token… Continue reading Women in Cybersecurity No Longer an ‘Anomaly’

Women in Information Security: Claire Reckless

Last time, I had the opportunity to talk to Toronto’s own Jennifer Fernick. Somehow, she juggles graduate computer science studies with taking care of a bank’s cybersecurity. I couldn’t do that! This time, I had the honour of speaking… Continue reading Women in Information Security: Claire Reckless

Women in Information Security: Jennifer Fernick

Last time, I had the privilege of interviewing Fortalice Solutions founder Theresa Payton. Her combination of White House and private sector intelligence and cybersecurity experience gives her a truly one-of-a-kind perspective in this industry. This ti… Continue reading Women in Information Security: Jennifer Fernick

Monday, Aug. 6, Dtex in the News: The Pervasive Insider Threat, GDPR Creates Privileged User Security Problems, Vulnerable Humans Behind UnityPoint Data Breach

The Dtex 2018 Insider Threat Intelligence Report continues to lead industry discussions about how frequently the insider threat occurs in public and private sector organizations. Last week, CSO’s Christopher Burgess dove into the report in &#8220… Continue reading Monday, Aug. 6, Dtex in the News: The Pervasive Insider Threat, GDPR Creates Privileged User Security Problems, Vulnerable Humans Behind UnityPoint Data Breach

Monday, July 23: Dtex, Insider Threat, Privacy in the News: Top Ways Insiders Go Rogue, DOJ Shifts Focus to Election Security, HR Industry Eyes Importance of Privacy

It’s true that many of the most damaging data breaches are caused by trusted insiders who make mistakes and fall prey to attackers. There are also plenty of examples of malicious insiders who have caused chaos and driven loss after they decided t… Continue reading Monday, July 23: Dtex, Insider Threat, Privacy in the News: Top Ways Insiders Go Rogue, DOJ Shifts Focus to Election Security, HR Industry Eyes Importance of Privacy

Women in Information Security: Jessica Hebenstreit

Last time, I had the pleasure of speaking with Roxy Dee. Her expertise is in vulnerability management, and she also loves to pay it forward by giving away books to her lucky Twitter followers. This time I got to speak with Jessica Hebenstreit. She&#821… Continue reading Women in Information Security: Jessica Hebenstreit