Remove Course Remove Information Security Remove Malware Remove Presentation
article thumbnail

Spooky, Scary Tales of Vendor Management

SecureWorld News

Wooooo went the malware. And the five little vendors knew their customer hadn't discovered their gaps (in security). Granted, vendors are necessary to every business, and in a post-COVID world, your company is of course relying on vendors to move the growth of your business forward. And out went the apps. CCPA/GDPR compliant?

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

I’m Robert Vamosi and this episode about best practices in information security, and how critical life services, in particular, remain at risk today -- in the middle of a global pandemic. And of course they've had to deal with issues that have arisen through that. Vamosi: This is bad.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

I’m Robert Vamosi and this episode about best practices in information security, and how critical life services, in particular, remain at risk today -- in the middle of a global pandemic. And of course they've had to deal with issues that have arisen through that. Vamosi: This is bad.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

What if you are a woman in information security? I’m Robert Vamosi, and in the episode I’m talking about diversity, equality, and inclusion in information security with one of the industries' most successful examples. And so, maybe that's why we see low participation in CE and CS courses.

article thumbnail

The Hacker Mind Podcast: Gaining Persistence On Windows Boxes

ForAllSecure

She’ll also be presenting again at RSAC 2023 in April. Estimates vary greatly, with some security vendors claiming dwell time is as low as 11 days with ransomware while others claim dwell time can be as high as 200 days or more with more sophisticated attacks. Stealth malware. Special coding tricks?

Windows 40
article thumbnail

The Hacker Mind Podcast: The Hacker Revolution Will Be Televised

ForAllSecure

Whether it's finding a bug, whether it's for analyzing malware, it's just more of a like a compiler, it dooleys technology. And they said, Oh, do you want to help present a little bit like at DEF CON, because, you know, Jordan, you've done you want to do this kind of CTF stuff and you don't want to do more broadcast stuff.

article thumbnail

The Sony Hack in Context

CTOvision

If the target is clean, no problem, having gained access to their machine the perpetrators can simply use it to visit child porno sites or chat rooms then, while still concealing their role, ensure that the information is provided to law enforcement officials or the press. CTO cyber conflict cyberattack Cybersecurity'