Remove Conference Remove Firewall Remove Information Security Remove Network
article thumbnail

China Says NSA Is Hacking Top Military Research University

SecureWorld News

China's National Computer Virus Emergency Response Center (CVERC) recently made a statement accusing the United States National Security Agency (NSA) of repeatedly hacking the Northwestern Polytechnical University, a key public military research university located in Xi'an, China. stealing over 140GB of high-value data.

article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. Bigman worked in every area of information and data security, the last fifteen years as the Agency’s Chief Information Security Officer (CISO).

Software 257
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Timeline: How a Hacker Tried to Poison a City

SecureWorld News

No one knew it at the time, but this was actually the hacker's reconnaissance mission into the water treatment plant's computer network. The Pinellas County Sheriff told Reuters that the attacker used a remote access program called TeamViewer to enter the water treatment plant's network. No firewall? RELATED: U.S.

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat. Not all of us like being on camera or before a microphone or even standing on a conference stage, but for some of us this just comes naturally.

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat. Not all of us like being on camera or before a microphone or even standing on a conference stage, but for some of us this just comes naturally.

Media 52
article thumbnail

Talking Zero Trust and SASE with CISOs at the Summit

CIO Business Intelligence

There aren’t many events where a critical mass of Chief Information Security Officers gathers to exchange ideas about the current threat environment, key initiatives, etc. The annual Gartner Security and Risk Management Summit is one of them, and I’m looking forward to attending it this year.

WAN 113
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

You got into a network. So he invites me to go to a book that, you know, one of those first black hats and Doug Song was set doing his thing on checkpoint firewall bypass, and I'm sitting there, and a guy named Jeff Nathan. But I was given a Class A network, and I deployed as many snort sensors on it all over. What would I do?