Posted on June 6, 2011 by Josh Arrington
At the close of each week we look back on the major happenings in the security industry and recap the hottest news in our “IT Security Rewind.” This week however, we decided to mix things up a bit (all this summer weather must be getting to our heads) and instead we’ve listed some of the thought-provoking topics that may not be making headlines but still have major implications for the security industry.
Since Twitter has emerged as an outlet for individuals to engage in conversation and share their opinions, this week we scoured the social channel to see what security industry influencers have to say. Below are some of this week’s Top Security Tweets from thoughts leaders like Josh Corman, Bob Rudis, Chris Nerney and Eugene Spafford. Did you see any other interesting Tweets that we missed? Feel free to add them below.
@joshcorman For the EleventyBillionth time. An APT is not a WHAT, but a WHO and a HOW. It is an ADVERSARY. FREE: http://bit.ly/gGxuD9
@hrbrmstr What I would truly give a big chunk of budget $ for are infosec prods w/focused functions * *wicked-awesome* mgmt & reporting capabilities.
@RSAConference: Top five social media security threats (via @ChrisNerney) http://bit.ly/iqtYAP
@RobotSpaf: Why the bad guys are winning – Computerworld Blogs – Great list. I don’t agree with all of it, but 95% of it… http://tumblr.com/xfz2t3zpfg
Grossly Underestimating the Privileged Account Security Problem Part 3: Automating Privileged Account Management and Cyber-Ark DNA™ (Discovery & Audit)
Posted on May 16, 2013
Grossly Underestimating the Privileged Account Security Problem Part 2: Defining Privilege with Cyber-Ark CMO, John Worrall
Posted on May 9, 2013
Posted on May 8, 2013
Posted on May 6, 2013
Posted on May 3, 2013
AP Hack & Social Media Accounts – Another Great Example of the Danger of Shared, “Privileged” Accounts
Posted on April 25, 2013
Posted on April 1, 2013
Posted on February 22, 2013
DoE Security Breach Proves No Organization is Immune to Advanced Threats and the Privileged “Insider”
Posted on February 15, 2013
Copyright 2013 Cyber-Ark Software - All Rights Reserved