Remove Conference Remove Information Security Remove Malware Remove Open Source
article thumbnail

Why Taylor Swift Fans Should Work in Cybersecurity

SecureWorld News

These skills also happen to apply to information security (infosec) and cyber threat intelligence and research. And you'll leave your first infosec conference with an armful of them. Taylor may be the Mastermind behind the clues, but her fans' determination, critical thinking, and unparalleled passion deserve more credit.

Network 95
article thumbnail

The Hacker Mind Podcast: The Hacker Revolution Will Be Televised

ForAllSecure

Then there’s the open source free tool from the NSA, Ghidra. There's a couple of open source things now we have Deidre which has come out the NSA is an open source tool. There's a couple of open source things now we have Deidre which has come out the NSA is an open source tool.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

More and more criminals are identified through open source intelligence (OSINT). Find out what Daniel looks for and how he does digital forensics using social media and other open source resources. And they did, relatively quickly, using something known as Open Source Intelligence, or OSINT. You find clues.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs. Hammond: As a security researcher, I am hierarchically in their Threat OPs department. What’s a good entry point for starting CTFs or information security for that matter?

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs. Hammond: As a security researcher, I am hierarchically in their Threat OPs department. What’s a good entry point for starting CTFs or information security for that matter?