article thumbnail

HackerOne CEO Mårten Mickos: COVID-19 is ‘the planet’s warning’ to accelerate digital civilization

GeekWire

A native of Finland, he’s the former CEO of MySQL, the open-source database company that was sold to Sun Microsystems in 2008. TB: You became the CEO of HackerOne in 2015. So WiFi, VPN, authentication, passwords, mobile phones and so on. What about its mission resonated so much with you? It’s beautiful.

article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

On Tuesday, January 27, 2015 CTOvision publisher and Cognitio Corp co-founder Bob Gourley hosted an event for federal big data professionals. Authentication is addressed for the perimeter security requirements. Active Directory and Kerberos are the authentication staples within the enterprise, allowing all users to be authenticated.

Big Data 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Cybersecurity Sprint: Are we safe yet?

Cloud Musings

Agencies were instructed to immediately patch critical vulnerabilities, review and tightly limit the number of privileged users with access to authorized systems and dramatically accelerate the use of strong authentication, especially for privileged users. Jackson 2015 ) Follow me at [link].

Dell 70
article thumbnail

15 must-try open source BI software for enhanced data insights

Dataconomy

Open source business intelligence software is a game-changer in the world of data analysis and decision-making. With open source BI software, businesses no longer need to rely on expensive proprietary software solutions that can be inflexible and difficult to integrate with existing systems.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.

article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Vamosi: In 2015 Samy Kamkar debuted at DEF CON and attack he called a role jam attack. And even after using that token a few times for authentication responses so like positive, at least at that point, the car should go ahead and say alright, I do and I make a new token so that the next time the phone key has to respond differently.

Course 52