Remove page j
article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

.” That warning, so obvious today, was a blunt wake-up call 20 years ago for many of the software developers reading the book Writing Secure Code, by Microsoft security engineering leaders Michael Howard and David LeBlanc. Bill Gates was one. “I’m confident he’s going to help us build that,” Jakkal said.

Microsoft 104
article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

In this episode, Sonny Sandelius , Assistant Director of the SANS workforce programs, talks about programs that recruit people from outside computer sciences, encouraging those from diverse backgrounds who share the curiosity and the basic aptitude necessary to become hired cybersecurity professionals in as little as six months.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Crimeware As A Service

ForAllSecure

The LockBit ransomware gang no longer offers just one service, like ransomware, but multiple services, like anti-analysis tools and bug bounty programs. Using the motto 'Make Ransomware Great Again,' new versions of LockBit are adding new features such as anti-analysis, new extortion methods, and even a ransomware bug bounty program.

Malware 40
article thumbnail

The Hacker Mind: G-Men in Cyberspace

ForAllSecure

Vamos i That day in 1993, six people died and the event was front page news for weeks. Here's a 1930s propaganda piece with FBI Director J. So I think it's still the responsibility of those executives to really understand, you know, you don't have to have the program. They're both honored and 10 stories. Edgar Hoover.

article thumbnail

How to make your offline self harder to find online

The Verge

You can’t wipe all your info off the internet — but you can make it less available There are two key concepts in information security : threat model and attack surface. If your threat model includes the curiosity of nation-state intelligence services, you have many more things to worry about than J. million pages being delisted.

How To 130