article thumbnail

Roadmap to Securing Your Infrastructure

Linux Academy

If you look around, you’ll see we’re not fighting off human replicas as Harrison Ford did in the 1982 film Blade Runner , which was set in the futuristic time period of 2019. “Cyber” encompasses all things computer-based, including the internet, phones, and even our refrigerators and coffee pots.

article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. Literally, how the rebellion fighting the Empire has echoes in how we approach and mitigate information security threats. It’s called the Death Star Architect Speaks Out.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Sony Hack in Context

CTOvision

If the target is clean, no problem, having gained access to their machine the perpetrators can simply use it to visit child porno sites or chat rooms then, while still concealing their role, ensure that the information is provided to law enforcement officials or the press. Political Manipulation. The federal government ought to do so.

article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

I studied English and Film Making in college; I did not get a traditional CS degree. So I started attending Black Hat, Def Con, and after many years wrote my own book on the insecurity of internet of things devices. But how do you even start to identify who might be good in a role in information security?

article thumbnail

The Hacker Mind Podcast: How To Become A 1337 Hacker

ForAllSecure

But it wasn’t until I was watching Britney Runs A Marathon, a critically acclaimed 2019 film, that it occurred to me that people who don’t run 5Ks, 10Ks or full-on marathons are under the mistaken impression that I might be running to WIN the race. And you can find some of her malware analysis on the Internet.

How To 40
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

vassal him Chuck is the electric control center manager and told us when hackers took over their computers, all his workers could do was film it with their cell phones. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. But also war over the internet.

System 52
article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

I’m Robert Vamosi and in this episode I’m talking about our right to repair, how some high tech companies might want to limit that right, and how there’s a group of information security professionals who are volunteering their free time to fight for those rights in local legislation.