Remove page j
article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

.” That warning, so obvious today, was a blunt wake-up call 20 years ago for many of the software developers reading the book Writing Secure Code, by Microsoft security engineering leaders Michael Howard and David LeBlanc. Bill Gates was one. “I’m confident he’s going to help us build that,” Jakkal said.

Microsoft 107
article thumbnail

The Hacker Mind Podcast: Crimeware As A Service

ForAllSecure

And I work on a team called surge which is primarily a research group focused on security. But at the company a little over two years, and in that time, it was surge launched and we have done a lot of work in the vein of research and response to things like solar winds to log for J Colonial Pipeline Casaya. Vamosi: Right.

Malware 40
article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

So I holed up for a week and half and read Shon Harris’ amazing CISSP prep guide-- all 1100 pages of it-- cover to cover. Then again, you might want someone --anyone -- to come in as a Level 1 security analyst so your current Level 1s can advance. Sandelius: J ust a large gap expansion. It’s simple things like that.