Remove 2000 Remove InfoSec Remove Internet
article thumbnail

Episode 232: Log4j Won’t Go Away (And What To Do About It.)

The Security Ledger

If you’ve been paying attention to your infosec news feed this week, you’ve been inundated with stories and headlines about something called “log4j, a (previously) obscure library that is a common component of a number of Apache software frameworks. That’s out of a total population of 7.1 Supply Chain Risks: The New Normal.

article thumbnail

Y2k + 20: risk, COVID and "the Internet issue"

Notice Bored

For a long time prior to the year 2000, a significant number of software programmers had taken the same shortcut we all did back in "the 90s". which leaves our organisations, management and society at large asking themselves "What have the infosec pros ever done for us? The sheer scale of the Internet problem is the real issue.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2021 Hispanic Heritage Month Pt. 1: A Celebration of Hispanic Heritage and Hope

McAfee

He recognized my passion for infosec (it wasn’t called cyber back then) and provided me with the support needed to make my ideas and projects a reality. Thanks to him I was able to co-found one of the first infosec consulting businesses in Spain in 2000, and I’m still very grateful for that opportunity. it’s on LinkedIn too).

InfoSec 83
article thumbnail

‘I vowed I was going to teach people’: NPower’s trauma-informed training nurtures digital talent

SC Magazine

As an infosec leader, Vaughn witnessed first-hand the dearth of available IT talent that’s available to hire. Founded in 2000, the nonprofit aims to “launch pathways for prosperity and economic mobility, particularly by helping to launch digital careers,” said Vaughn. The average salary among graduates is $80,000.).

article thumbnail

Weaving strategies with policies

Notice Bored

What about the technology risks, not least our ever-increasing dependence on the Internet? As well as infosec policies, what are your business policies for managing the information risk security function?

Risk 66
article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Whether it’s designing or just playing CTFs, John Hammond knows a lot about the gamification of infosec. In the moment you’ll meet someone who’s been gamifying infosec for years. The general goal with Cyberstakes is to first and foremost to introduce and educate people with basic infosec skills.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Whether it’s designing or just playing CTFs, John Hammond knows a lot about the gamification of infosec. In the moment you’ll meet someone who’s been gamifying infosec for years. The general goal with Cyberstakes is to first and foremost to introduce and educate people with basic infosec skills.