Remove page w
article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

.” That warning, so obvious today, was a blunt wake-up call 20 years ago for many of the software developers reading the book Writing Secure Code, by Microsoft security engineering leaders Michael Howard and David LeBlanc. Microsoft acknowledges that it’s unique in delivering both software and security products.

Microsoft 106
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security. Vamosi: So what am I missing here. Here's an accomplished woman with five master's degrees and 15 years of experience in it.

Study 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security. Vamosi: So what am I missing here. Here's an accomplished woman with five master's degrees and 15 years of experience in it.

Study 40
article thumbnail

Putin Advisor: 'Military Activities in Cyberspace Are in Full Swing'

SecureWorld News

Security researchers believe that Russian hackers were not only responsible for the SolarWinds incident—which left thousands of organizations and government agencies vulnerable to cyberattacks—but they are also responsible for other ransomware attacks on critical infrastructure. But we have to anticipate their next moves.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

They spent that time researching and understanding the environment. So it wasn't this story that we hear sometimes thrown around about Lightspeed net speed cyberattacks, you know it was human adversaries doing research on the environment, so the attack starts. As long as systems are air gaped,w ’re okay?

System 52