Remove page m
article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

.” That warning, so obvious today, was a blunt wake-up call 20 years ago for many of the software developers reading the book Writing Secure Code, by Microsoft security engineering leaders Michael Howard and David LeBlanc. “I’m confident he’s going to help us build that,” Jakkal said.

Microsoft 106
article thumbnail

Achieving sustainable PCI security excellence

CIO Business Intelligence

The value of pinpointing constraints Navigating the PCI Data Security Standard encourages departing from conventional approaches, especially when organizations grapple with a persistent cycle of noncompliance. Data and Information Security

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

So I holed up for a week and half and read Shon Harris’ amazing CISSP prep guide-- all 1100 pages of it-- cover to cover. But how do you even start to identify who might be good in a role in information security? Sandelius: I’m Sonny Sandelius. And then I sat for six hours and took the test.

article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. I’m Robert Vamosi, and in this episode I’m going to talk about … Star Wars. I’m Robert Vamosi, and in this episode I’m going to talk about … Star Wars.

article thumbnail

The Hacker Mind Podcast: Crimeware As A Service

ForAllSecure

I’m Robert Vamosi, and in the episode I’m talking about ransomware, and more specifically about the ecosystem of criminal activity that’s been built up around it as we more toward what some are calling crimeware as a service. And I work on a team called surge which is primarily a research group focused on security.

Malware 40
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

Here’s Robert M. They spent that time researching and understanding the environment. So it wasn't this story that we hear sometimes thrown around about Lightspeed net speed cyberattacks, you know it was human adversaries doing research on the environment, so the attack starts. When they did that.

System 52
article thumbnail

Army Cyber Defense Review: 'The Only Constant Is Change'

SecureWorld News

Brigadier General Martin White highlights t he fall issue of The Cyber Defense Review from the Army Cyber Institute at West Point with his take on "Tactics and Technicalities Undermining Strategy: Cyber Security is Distracting National Security Communities.". Traditional War: The Difference Is Fading ].