POPULARITY
Over the past 17 years, Kelly Jackson Higgins, editor-in-chief at Dark Reading, has watched the cybersecurity industry explode. She brings a unique perspective to the podcast in discussion with Brian and John as they pick apart the challenges faced in industrial environments to the vulnerabilities in healthcare organizations. Just as the world of technology journalism has changed, so has Dark Reading and the way they approach the industry, the major players, and evolving conversations in the space. Kelly's unique position allows her to triage the firehose of information for us, focusing on ransomware and "the whole AI thing," and more. Throughout the conversation, we will explore the importance of visibility and monitoring of connected devices, the persistent issue of devices being connected to the public internet when they shouldn't be, and the need for collaboration between IT and OT teams. We will also delve into recent cyber threats, such as ransomware attacks and the concerning trend of ransomware as a service, shedding light on the advancement of technology and its impact on cybersecurity.Join us as we explore these critical topics with our expert guest, Kelly Jackson Higgins, and uncover the challenges, advancements, and solutions in the realm of IoT security. Let's get into Things on the IoT Security Podcast!Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontosAnd you can follow John Vecchi at https://www.linkedin.com/in/johnvecchiThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast
In this episode, Jack Naglieri speaks to Kelly Jackson Higgins, Editor-in-Chief at Dark Reading. During the episode, they share their thoughts about how cyber threats have changed over the years. Topics discussed: Kelly offers fascinating insights into how cybersecurity journalism has evolved to keep pace with the ever-changing industry. She offers an example of why choosing to patch systems is not always an easy decision for security teams. Jack and Kelly talk about how perceptions around which organizations are likely targets have changed over the years. Kelly shares some of the crazier threat actor trends she has observed during her career covering cybersecurity. She offers three pieces of valuable advice for security teams.
Podcast: Unsolicited Response Podcast (LS 30 · TOP 10% what is this?)Episode: Women In ICS SecurityPub date: 2021-02-18This week's Unsolicited Response Show focuses on the issue that women are vastly underrepresented in ICS security and what we need to do to change this both in numbers and career paths and prospects. Kelly Jackson Higgins joins me to co-host this episode, and we have great guests including: Kristin Demoranville MJ Emanuel Najo Ifield Najla Lindsey Megan Samford We've seen lots of progress and growth in the women in ICS community, and I actually could have had many more great guests on the episode. Still their is much to do to make the community more open and inclusive and supportive to those entering the field.The podcast and artwork embedded on this page are from Dale Peterson: ICS Security Catalyst and S4 Conference Chair, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
This week's Unsolicited Response Show focuses on the issue that women are vastly underrepresented in ICS security and what we need to do to change this both in numbers and career paths and prospects. Kelly Jackson Higgins joins me to co-host this episode, and we have great guests including: Kristin Demoranville MJ Emanuel Najo Ifield Najla Lindsey Megan Samford We've seen lots of progress and growth in the women in ICS community, and I actually could have had many more great guests on the episode. Still their is much to do to make the community more open and inclusive and supportive to those entering the field.
Dark Reading’s Executive Editor Shares Her Perspective on Cyber SecurityIn this episode of Agent of Influence, Nabil talks with Kelly Jackson Higgins, executive editor of Dark Reading about how she got interested in the IT industry, topics she has most enjoyed covering, and how she became one of Folio’s Top Women in Media.
Podcast: Unsolicited Response PodcastEpisode: Kelly Jackson Higgins Interviews DalePub date: 2020-03-04The tables are turned in this episode of the Unsolicited Response podcast with Kelly Jackson Higgins of Dark Reading interviewing Dale in the S4x20 Green Room. Kelly has been coming to S4 and covering the ICS security space for over seven years, and this experience lets her write and edit articles with important information and minimal hype. In this interview Kelly and I discuss: Deciding what to patch when The value and acceptance of Pwn2Own in the ICS security community Is the gap between IT and OT still 10 years? New defensive products and techniques in ICS What should asset owners do with undocumented backdoors / special access features? Knowing your asset inventory Links: Highway Training Course (registration for the free online version opens on March 9th) Kelly Jackson Higgins bio and articles on Dark Reading The podcast and artwork embedded on this page are from Dale Peterson: ICS Security Catalyst and S4 Conference Chair, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
The tables are turned in this episode of the Unsolicited Response podcast with Kelly Jackson Higgins of Dark Reading interviewing Dale in the S4x20 Green Room. Kelly has been coming to S4 and covering the ICS security space for over seven years, and this experience lets her write and edit articles with important information and minimal hype. In this interview Kelly and I discuss: Deciding what to patch when The value and acceptance of Pwn2Own in the ICS security community Is the gap between IT and OT still 10 years? New defensive products and techniques in ICS What should asset owners do with undocumented backdoors / special access features? Knowing your asset inventory Links: Highway Training Course (registration for the free online version opens on March 9th) Kelly Jackson Higgins bio and articles on Dark Reading
Podcast: Unsolicited Response PodcastEpisode: Press Coverage of ICS SecurityPub date: 2018-05-02This was a fun panel discussion on the S4x18 Main Stage with Kelly Jackson Higgins of Dark Reading and Jim Finkle of Reuters. We covered a lot of grounds in a frank discussion including: Who is your reader? Are you traffickers in FUD? How long will people click on the vulnerability or exploit of the day in ICS or IIoT? What are your thoughts and response to the ICS vuln as a marketing strategy? How long do you get to spend on a story? How should the ICSsec community pitch a story to a reporter? What's the best way to reach a reporter? Explain the off-the-record / background / limited use definitions and practice? What should I make of the fact that many reporters are asking me to speculate on who was the Triton victim? Kelly and Jim are experienced reporters and have been covering the ICSsec space for years. I think this was Kelly's sixth S4 and Jim's third. This episode was sponsored by CyberX. Founded by military cyber experts with nation-state expertise defending critical infrastructure, CyberX has developed an end-to-end platform for continuous ICS threat monitoring and risk mitigation. Check out the CyberX Global ICS and IIoT Risk Report and my podcast from last year on the report with Phil Neray.The podcast and artwork embedded on this page are from Dale Peterson: ICS Security Catalyst and S4 Conference Chair, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
In this very special episode of #IMM, Christine speaks with Kelly Jackson Higgins, executive editor at Dark Reading. Kelly dives into her career, her focus areas, the upcoming Black Hat conference and much more! "Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, CommunicationsWeek, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at The College of William & Mary. Follow her on Twitter @kjhiggins."
This was a fun panel discussion on the S4x18 Main Stage with Kelly Jackson Higgins of Dark Reading and Jim Finkle of Reuters. We covered a lot of grounds in a frank discussion including: Who is your reader? Are you traffickers in FUD? How long will people click on the vulnerability or exploit of the day in ICS or IIoT? What are your thoughts and response to the ICS vuln as a marketing strategy? How long do you get to spend on a story? How should the ICSsec community pitch a story to a reporter? What's the best way to reach a reporter? Explain the off-the-record / background / limited use definitions and practice? What should I make of the fact that many reporters are asking me to speculate on who was the Triton victim? Kelly and Jim are experienced reporters and have been covering the ICSsec space for years. I think this was Kelly's sixth S4 and Jim's third. This episode was sponsored by CyberX. Founded by military cyber experts with nation-state expertise defending critical infrastructure, CyberX has developed an end-to-end platform for continuous ICS threat monitoring and risk mitigation. Check out the CyberX Global ICS and IIoT Risk Report and my podcast from last year on the report with Phil Neray.
Dark Reading executive editor Kelly Jackson Higgins joins the podcast to tell security journalism war stories, talk about her new WiFi-enabled refrigerator and some trends worth following closely.