• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Information Systems Security Association

Los Angeles Chapter, cybersecurity, InfoSec, CISO, Privacy

  • Home
  • About
    • About ISSA-LA
    • Our Mission
    • ISSA LA Bylaws
    • Board Members
    • Advisory Board Members
    • Contact Us
  • Events
    • Upcoming Events
    • Past Events
    • Event Archive
    • Speaker Guide
  • Security Tracks
    • Management
    • Privacy
    • Proactive
    • Reactive
    • Technical
  • Security Summits
    • Summit XII 2022
    • Summit XI 2019
    • Summit X 2018
  • Membership
  • Become a Sponsor
    • Become Monthly Meeting Sponsor
    • Become 2022 Summit Sponsor
  • Resources
    • Information Security Links
    • Keeping Kids and Families Safe Online

Management

June – By Paige M. Boshell

July 7, 2019 By Technology Director

Filed Under: ISSA Monthly Journal Articles, Management, Privacy, Proactive

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2

Primary Sidebar

Join Our Mailing List and Meetup

Email Subscription

Follow ISSA LA

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Listen to ISSA-LA President Richard Greenberg Being Interviewed by Ron Burgundy (Will Ferrell)

Grant funds are now available: Get exclusive access to Information Security Leaders: ask questions and obtain guidance; get policies, procedures and governance

We are Proud to Present our Educational Sponsors

ISSA Education Foundation

ISSA Los AngelesFollow

Information Systems Security Association Los Angeles Chapter

ISSA Los Angeles
issalaISSA Los Angeles@issala·
20 May

Microsoft says it’s noticed an increase in malware (dubbed “cryware”) targeting internet-connected cryptocurrency wallets, and they’re using some surprisingly sophisticated tools to do it. https://www.microsoft.com/security/blog/2022/05/17/in-hot-pursuit-of-cryware-defending-hot-wallets-from-attacks/?utm_campaign=itb&utm_medium=newsletter&utm_source=morning_brew

Reply on Twitter 1527439012054679552Retweet on Twitter 1527439012054679552Like on Twitter 15274390120546795522Twitter 1527439012054679552
issalaISSA Los Angeles@issala·
19 May

Nearly five months after the announcement of a major vulnerability in the Java-based logging platform Log4J, two reports show that Web servers and applications—thousands of them, in fact—are still exposed to Log4J-specific exploits. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228

Reply on Twitter 1527378606367813632Retweet on Twitter 1527378606367813632Like on Twitter 15273786063678136321Twitter 1527378606367813632
issalaISSA Los Angeles@issala·
19 May

Emergency alert from CISA directs federal agencies to deploy VMware updates or remove the company's software. https://www.cisa.gov/emergency-directive-22-03?mod=djemCybersecruityPro&tpl=cy

Reply on Twitter 1527316769085730817Retweet on Twitter 1527316769085730817Like on Twitter 15273167690857308171Twitter 1527316769085730817
issalaISSA Los Angeles@issala·
17 May

ISSA LA | Join us ~In Person~ TOMORROW Evening - Securing the Factories of Tomorrow - May 18 @ 5:30 pm - 8:30 pm PST - $50 Raffle! RSVP Here: https://issala.org/event/issa-la-may-2022-in-person-dinner-meeting-securing-the-factories-of-tomorrow/

Reply on Twitter 1526695976311873536Retweet on Twitter 15266959763118735361Like on Twitter 15266959763118735361Twitter 1526695976311873536
issalaISSA Los Angeles@issala·
13 May

ISSA LA | Join us ~In Person~ in May on the 18th - Securing Smart Factories and Data Driven IOT with Speaker:
Wendy Frank - May 18 @ 5:30 pm - 8:30 pm PST - $50 Raffle! @ Deloitte in Manhattan Beach! Register here! https://issala.org/event/issa-la-may-2022-in-person-dinner-meeting-securing-the-factories-of-tomorrow/

Reply on Twitter 1525176339992567812Retweet on Twitter 15251763399925678122Like on Twitter 15251763399925678122Twitter 1525176339992567812
issalaISSA Los Angeles@issala·
5 May

18+ months. That’s how long cyber-espionage group UNC3524 was able to hide inside IoT networks, taking advantage of devices unsupported by security options like anti-virus software. https://www.zdnet.com/article/this-sneaky-hacking-group-hid-inside-networks-for-18-months-without-being-detected/ https://www.zdnet.com/article/this-sneaky-hacking-group-hid-inside-networks-for-18-months-without-being-detected/?utm_campaign=itb&utm_medium=newsletter&utm_source=morning_brew

Reply on Twitter 1522305170763358209Retweet on Twitter 1522305170763358209Like on Twitter 15223051707633582091Twitter 1522305170763358209
Load More...

Website Sponsors

Harassment Free Environment

ISSA-LA is dedicated to providing a harassment-free experience for everyone, regardless of gender, gender identity and expression, sexual orientation, disability, physical appearance, body size, race, age, religion, or political affiliation. We have a zero tolerance policy for harassment in any form. Violations by any registered attendee or participant at any ISSA-LA events may result in expulsion and possible ban from future ISSA-LA events.


© Copyright 2019 ISSA LA · All Rights Reserved · Privacy Policy · Terms of Use