Interview With Cybersecurity Specialist Szilveszter Szebeni
For the next interview in our series speaking to technical leads from around the world, we’ve welcomed experienced cybersecurity specialist Szilveszter Szebeni, CISO at Tresorit.
For the next interview in our series speaking to technical leads from around the world, we’ve welcomed experienced cybersecurity specialist Szilveszter Szebeni, CISO at Tresorit.
For our next specialist interview in our series speaking to technology and IT leaders around the world, we’ve welcomed Abhay Bhargav to share his thoughts on the topic of cybersecurity.
For the next interview in our series speaking to technical leads from around the world, we’ve welcomed experienced cybersecurity specialist and author Greg Scott.
For our latest expert interview on our blog, we’ve welcomed Joseph Williams, Director of the Leahy Center for Digital Forensics to share his thoughts on the topic of cybersecurity. The Leahy Center for Digital Forensics at Champlain College is a leading world-class laboratory providing digital forensics and cybersecurity services to a wide variety of organizations, from government bodies to local businesses.
For the newest instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed Kurt Rohloff, Co-founder and Chief Scientist, of Duality. Prof. Rohloff is the founding architect of the PALISADE open-source homomorphic encryption library and co-founder of the HomomorphicEncryption.org industry consortium.
For the next instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed Israël Hallé, Co-Founder of Flare Systems. Israël’s experience includes working with the Merchant Protection and Checkout team at Shopify. After that, he was a malware analyst and a reverse engineer at Google where he hunted down new malware threats and introduced automation operations through big data analysis.
For our latest specialist interview in our series speaking to security leaders from around the world, we’ve welcomed Tony Giles, Lead Auditor and CMMC Provisional Assessor with the NSF. Tony has conducted audits globally for over 10 years and worked on large-scale security implementation projects, including NIST 800-171, NIST 800-88 and ISO/IEC 27001, ISO 28000.
For the next installment in our series of interviews asking leading security and compliance specialists about their achievements in their field, we’ve welcomed Rhia Dancel, Lead Auditor and CMMC Registered Practitioner with the NSF. Rhia Dancel is an ISO/IEC 27001 and 9001 Lead Auditor for NSF-ISR as well as a CMMC Registered Practitioner and has previously held several auditing and technical positions in information security and pharma quality sectors.
This guide has been created to explain the importance of firewalls, whitelisting and blacklisting as part of your IT security protocols in order to protect your system and improve your understanding of this topic as an IT professional. In this resource, we will also cover the key differences between using whitelists and blacklists, as well as why it is important that your security monitoring system includes ways to internally whitelist/blacklist IPs.
COBIT is an acronym for Control Objectives for Information and Related Technologies. The COBIT framework was created by Information Systems Audit and Control Association, ISACA to bridge the crucial gap between technical issues, business risks and control requirements. COBIT is an IT governance framework for businesses that want to implement, monitor and improve their IT management best practices.