article thumbnail

Cyber Heroes Recognized in SecureWorld 2024 Conference Theme

SecureWorld News

Information Security is no different. Hedy Lamarr: Hollywood Star and Secret Inventor Hedy Lamarr was a glamorous actress who starred in films of the 1940s and '50s. She was a brilliant inventor who developed a revolutionary new technology that formed the basis for Wi-Fi, GPS, and Bluetooth.

article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

that uses both Star Wars and STRIDE to help engineers under vulnerabilities and threats in software development. Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. A few years later it would become the highest grossing films of all time.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Sony Hack in Context

CTOvision

The loss of this information places US weapons systems and personnel at risk while saving China billions in weapons development costs. As noted above, advanced nations are developing the ability to launch attacks that could disable entire telecommunications networks or energy grids, if only to deter similar attacks by their rivals.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

I did get a film degree in college, along with an English degree, but after college, well, knowing how the sausage was made, I wasn’t keen on going to Hollywood. What if you are a woman in information security? It was around this time that she developed something called Chenxification, which she insists was not her term.

article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

I studied English and Film Making in college; I did not get a traditional CS degree. Then again, you might want someone --anyone -- to come in as a Level 1 security analyst so your current Level 1s can advance. But how do you even start to identify who might be good in a role in information security?

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

I’m Robert Vamosi and this episode about best practices in information security, and how critical life services, in particular, remain at risk today -- in the middle of a global pandemic. Continuous Testing at the Speed of Development. From a 1953 health class film, here are some basic tips to avoid spreading the measles.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

vassal him Chuck is the electric control center manager and told us when hackers took over their computers, all his workers could do was film it with their cell phones. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. It was illogical and chaotic. Can we use them?

System 52