Dr. Erroll G. Southers will deliver the keynote address at the RS2 Technologies 2019 Annual Conference on March 6, 2019 at the Coronado Island Marriott Resort in San Diego, Calif.
Security-minded organizations know that the next cyber threat may be the worst. That’s why they take preemptive measures to protect their most valuable assets.
Cybersecurity is a fact of business life, but employers are not always pleased when a cybersecurity professional reports a serious and expensive cyber deficiency. Often, instead of addressing the problem, they shoot the messenger and retaliate against the whistleblower.
Whether it’s done to meet compliance requirements or just as a general best practice, most organizations are now testing their own networks for security weaknesses, and if they’re not, they should be. The many different types of tests can be confusing for the uninitiated; we will take a look at the common types with their strengths and weaknesses.
Representatives from Tesla Motors Inc., say the company will be investigating and rectifying any vulnerabilities discovered as a result of a hacking contest in Beijing starting today, of which the Tesla Model S sedan is the key target.
Could a hacker manipulate an airport x-ray machine into masking weapons or contraband in carry-on luggage? According to security researchers Billy Rios and Terry McCorkle, the answer is yes.