Remove Examples Remove Information Security Remove Programming Remove Social
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat. Massive numbers.

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat. Massive numbers.

Media 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

E-Government: A Graduate Class

CIO Musings

Not setting a very good example I am afraid. The class title is INFO 691 Topics in Information Systems – Digital Government This class is about using information and communication technologies to provide government services. Open data, social media, websites, APIs, collaboration & sharing networks.

article thumbnail

3 ways to deter phishing attacks in 2023

CIO Business Intelligence

In fact, CIO has reported that it takes only a few minutes for experienced hackers to set up a social engineering attack against enterprises (and their managed service providers) that consider themselves to be secure and protected. Cyberattacks, Data and Information Security, Phishing Let’s dig deeper.

Training 140
article thumbnail

Common Techniques Hackers Use to Penetrate Systems and How to Protect Your Organization

ForAllSecure

Common Types of Cyber Attacks Common techniques that criminal hackers use to penetrate systems include social engineering, password attacks, malware, and exploitation of software vulnerabilities. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.”

System 40
article thumbnail

Threat Intelligence and Security Awareness?

SecureWorld News

In our exclusive Behind the Scenes interview series, we take a deeper look at a topic that is relevant to the information security community. Today's conversation answers this question: How can threat intelligence strengthen security awareness? Will you give us some information on each one? SecureWorld] Great analysis.

article thumbnail

8 data strategy mistakes to avoid

CIO Business Intelligence

“Similar to disaster recovery, business continuity, and information security, data strategy needs to be well thought out and defined to inform the rest, while providing a foundation from which to build a strong business.” Generative AI, in fact, is a great example of this,” he says.

Strategy 136