article thumbnail

Cyber Heroes Recognized in SecureWorld 2024 Conference Theme

SecureWorld News

Information Security is no different. She foresaw music, graphics, and AI applications. Hedy Lamarr: Hollywood Star and Secret Inventor Hedy Lamarr was a glamorous actress who starred in films of the 1940s and '50s. Throughout history, many people have worked behind the scenes to help humanity reach its potential.

article thumbnail

Life at ForAllSecure: Robert Vamosi, Director of Product Marketing

ForAllSecure

While I was doing that, I wrote my first book on IOT security. I also got my CISSP certification, because I wanted to show people that even though I started as a journalist, I actually understand information security. I am featured in a documentary film on the history of hacking called Code 2600.

Journal 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

I did get a film degree in college, along with an English degree, but after college, well, knowing how the sausage was made, I wasn’t keen on going to Hollywood. What if you are a woman in information security? To this day, the US Department of Defense uses chenxification to protect mobile applications.

article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. Literally, how the rebellion fighting the Empire has echoes in how we approach and mitigate information security threats. It’s called the Death Star Architect Speaks Out.

article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

I studied English and Film Making in college; I did not get a traditional CS degree. Then again, you might want someone --anyone -- to come in as a Level 1 security analyst so your current Level 1s can advance. But how do you even start to identify who might be good in a role in information security? So on and so forth.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

CareFusion’s parent company Becton Dickinson responded, saying that all 14 hundred and 18 of the identified vulnerabilities were within third-party software applications including Windows XP and Symantec pcAnywhere, and others. From a 1953 health class film, here are some basic tips to avoid spreading the measles.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

CareFusion’s parent company Becton Dickinson responded, saying that all 14 hundred and 18 of the identified vulnerabilities were within third-party software applications including Windows XP and Symantec pcAnywhere, and others. From a 1953 health class film, here are some basic tips to avoid spreading the measles.