Remove page m
article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

.” That warning, so obvious today, was a blunt wake-up call 20 years ago for many of the software developers reading the book Writing Secure Code, by Microsoft security engineering leaders Michael Howard and David LeBlanc. “I’m confident he’s going to help us build that,” Jakkal said.

Microsoft 104
article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

In this episode, Sonny Sandelius , Assistant Director of the SANS workforce programs, talks about programs that recruit people from outside computer sciences, encouraging those from diverse backgrounds who share the curiosity and the basic aptitude necessary to become hired cybersecurity professionals in as little as six months.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Achieving sustainable PCI security excellence

CIO Business Intelligence

The outcome should be lasting compliance success, emphasizing the importance of identifying constraints while using a logical approach to develop PCI security compliance programs. Verizon’s analysis of PCI security compliance efforts over the last decade reveals a nagging problem: how to overcome compliance program stagnation.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

Here’s Robert M. So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. Probably Probably who has an interest in setting back the Iranian nuclear program? Intelligence Agency?

System 52
article thumbnail

The Hacker Mind Podcast: Gaining Persistence On Windows Boxes

ForAllSecure

I’m Robert Vamosi, and in this episode we’re talking about ways in which bad actors can manipulate legitimate tools to gain persistence on a site so they can steal data or encrypt it for ransom. And normally we know it's program files, but it's going to actually go to the program and it's going to add exe to it.

Windows 40
article thumbnail

The Hacker Mind Podcast: Crimeware As A Service

ForAllSecure

The LockBit ransomware gang no longer offers just one service, like ransomware, but multiple services, like anti-analysis tools and bug bounty programs. Using the motto 'Make Ransomware Great Again,' new versions of LockBit are adding new features such as anti-analysis, new extortion methods, and even a ransomware bug bounty program.

Malware 40