article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

I did get a film degree in college, along with an English degree, but after college, well, knowing how the sausage was made, I wasn’t keen on going to Hollywood. What if you are a woman in information security? When I was a kid, I really wanted to direct motion pictures. I went to San Francisco. And the good news?

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

I suppose such things happen, but what I remember was her telling her surprise when the system booted up and the Windows 95 splash screen came up … wait, what? Microsoft, for example, stopped patching Windows XP for security vulnerabilities in 2014. Then nothing. The machine crashed, and the lab tech had to reboot.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

I suppose such things happen, but what I remember was her telling her surprise when the system booted up and the Windows 95 splash screen came up … wait, what? Microsoft, for example, stopped patching Windows XP for security vulnerabilities in 2014. Then nothing. The machine crashed, and the lab tech had to reboot.

article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. Literally, how the rebellion fighting the Empire has echoes in how we approach and mitigate information security threats. It’s called the Death Star Architect Speaks Out.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

vassal him Chuck is the electric control center manager and told us when hackers took over their computers, all his workers could do was film it with their cell phones. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. It was illogical and chaotic. It gets lost.

System 52