James Coker (@reportercoker) 's Twitter Profile
James Coker

@reportercoker

Deputy Editor at Infosecurity Magazine infosecurity-magazine.com

ID: 1240331580461252613

calendar_today18-03-2020 17:37:59

1,1K Tweet

1,1K Followers

561 Following

Beth Maundrill (@gunshipgirl) 's Twitter Profile Photo

🎉This is BRAND NEW from Infosecurity Magazine for 2025. We've curated an agenda which focuses on some of the hot button issues CISOs face today, including: ▪️Personal liability ▪️Talking with the Board ▪️Investing in AI for cybersecurity I hope you can join us 👇

Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

CISOs are under increasing scrutiny, with personal liability for cybersecurity incidents becoming a real concern. At tomorrow's fireside chat at the Infosecurity Magazine Virtual Summit, defense attorney Jessica Nall break down the legal landscape and share practical steps to

CISOs are under increasing scrutiny, with personal liability for cybersecurity incidents becoming a real concern.  

At tomorrow's fireside chat at the Infosecurity Magazine Virtual Summit, defense attorney Jessica Nall break down the legal landscape and share practical steps to
Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

At tomorrow's Infosecurity Magazine Virtual Summit session with James Coker, attendees will learn how to build strong executive relationships, take a resilience-based approach to security, and use data-driven insights to showcase the value of security investments. Register

At tomorrow's Infosecurity Magazine Virtual Summit session with <a href="/ReporterCoker/">James Coker</a>, attendees will learn how to build strong executive relationships, take a resilience-based approach to security, and use data-driven insights to showcase the value of security investments.  

Register
Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

In a recent interview with Infosecurity, the Booking.com CSO shared insights into the challenges of protecting a platform that serves millions worldwide, and explored how AI is playing a crucial role in strengthening defenses Read the full interview here:

In a recent interview with Infosecurity, the Booking.com CSO shared insights into the challenges of protecting a platform that serves millions worldwide, and explored how AI is playing a crucial role in strengthening defenses

Read the full interview here:
Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

On March 27, join a webinar with Ping Identity to cover AI’s role in identity verification, decentralized identity solutions, and the ethical considerations of AI-driven decision-making Register now: spkl.io/6012fQ6Nj

On March 27, join a webinar with <a href="/pingidentity/">Ping Identity</a> to cover AI’s role in identity verification, decentralized identity solutions, and the ethical considerations of AI-driven decision-making

Register now: spkl.io/6012fQ6Nj
Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

A year after launching Security Copilot, Microsoft is expanding its AI-powered cybersecurity capabilities with six new specialized agents Infosecurity Magazine recently spoke with Microsoft's Corporate VP of Security, about what these developments mean for the broader AI

A year after launching Security Copilot, <a href="/Microsoft/">Microsoft</a> is expanding its AI-powered cybersecurity capabilities with six new specialized agents

Infosecurity Magazine recently spoke with Microsoft's Corporate VP of Security, about what these developments mean for the broader AI
Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

According to Follow CISA's accounts: @CISAgov and @CISACyber Seek, there are only 83 cybersecurity workers for every 100 job openings, and there is increasing demand for professionals with additional skills in areas like cloud computing and AI. Read the full article by Infosecurity Institute for insights on how to

According to <a href="/Cyber/">Follow CISA's accounts: @CISAgov and @CISACyber</a> Seek, there are only 83 cybersecurity workers for every 100 job openings, and there is increasing demand for professionals with additional skills in areas like cloud computing and AI. 

Read the full article by Infosecurity Institute for insights on how to
Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

Registration is now open for the upcoming Chrome Enterprise Roundtable at Infosecurity Europe! This session will cover best practices, real-world challenges, and future trends shaping enterprise security strategies. Join leading security experts for an in-depth discussion on

Registration is now open for the upcoming <a href="/googlechrome/">Chrome</a> Enterprise Roundtable at <a href="/Infosecurity/">Infosecurity Europe</a>! This session will cover best practices, real-world challenges, and future trends shaping enterprise security strategies.

Join leading security experts for an in-depth discussion on
Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

At Infosecurity Europe 2025, renowned physicist Brian Cox will deliver a keynote speech on quantum computing which will set the stage for an in-depth discussion on how quantum breakthroughs are reshaping the cybersecurity landscape and reinforcing the need for quantum-secure solutions.

At <a href="/Infosecurity/">Infosecurity Europe</a> 2025, renowned physicist Brian Cox will deliver a keynote speech on quantum computing which will set the stage for an in-depth discussion on how quantum breakthroughs are reshaping the cybersecurity landscape and reinforcing the need for quantum-secure solutions.
Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

In conversation with Infosecurity Magazine, Forescout 's VP of Security Intelligence reflected on how Infosecurity Europe has evolved over 30 years He highlighted how rising interest in cybersecurity has broadened the event’s audience & signaled a shift in perception, from a niche

Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

The traditional SOC model is no longer working - analysts are overwhelmed by alerts, stuck in manual processes, and facing increasing burnout Join Infosecurity Magazine and Tines on June 17 for a webinar where industry experts will explore how the SOC must evolve to meet

The traditional SOC model is no longer working - analysts are overwhelmed by alerts, stuck in manual processes, and facing increasing burnout

Join Infosecurity Magazine and <a href="/tines_hq/">Tines</a> on June 17 for a webinar where industry experts will explore how the SOC must evolve to meet
Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

The shift to hybrid, multicloud environments is introducing new layers of complexity Join F5 on July 23 to learn how to secure and scale AI applications, protect critical APIs, and safeguard your data and intellectual property in a rapidly changing landscape:

The shift to hybrid, multicloud environments is introducing new layers of complexity

Join <a href="/F5/">F5</a> on July 23 to learn how to secure and scale AI applications, protect critical APIs, and safeguard your data and intellectual property in a rapidly changing landscape:
Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

New Infosecurity Magazine podcast: Chinese threat actors exploit critical SharePoint vulnerabilities in 'ToolShell' attack chain Experts from Mandiant (part of Google Cloud) & BlueVoyant discuss attack details, patching and impact Listen now: infosecurity-magazine.com/podcasts/the-s…

New Infosecurity Magazine podcast: 
Chinese threat actors exploit critical SharePoint vulnerabilities in 'ToolShell' attack chain

Experts from <a href="/Mandiant/">Mandiant (part of Google Cloud)</a> &amp; <a href="/BlueVoyant/">BlueVoyant</a> discuss attack details, patching and impact

Listen now: infosecurity-magazine.com/podcasts/the-s…