Remove 2000 Remove InfoSec Remove IoT
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

Booth babes and rampant sexism were more of a problem in infosec in the past. I went to Black Hat in 2000. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. That is, until Chenxi Wang spoke up. Today she runs a 100% woman owned VC. So I learned. And it should.

InfoSec 40
article thumbnail

Y2k + 20: risk, COVID and "the Internet issue"

Notice Bored

For a long time prior to the year 2000, a significant number of software programmers had taken the same shortcut we all did back in "the 90s". which leaves our organisations, management and society at large asking themselves "What have the infosec pros ever done for us? IT and infosec pro's aren't. Make my day. That's not all.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weaving strategies with policies

Notice Bored

As well as infosec policies, what are your business policies for managing the information risk security function? Thinking about it, the very concept of 'office work', or indeed 'work', stretches back still further, along with 'business', 'commerce', 'profit' and 'money'. Virtual working is just one of several strategic issues.

Risk 66
article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

DXC Technology has over 40 years of infosec experience, most of which as HPE’s Enterprise Services. Services include tools for managing incident response, breaches, threats, and vulnerabilities, threat intelligence feeds, OT and IoT security, and cyber maturity reviews. See our in-depth analysis of Cymulate’s BAS platform. Boston, MA.

article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

He also talks about the future generation of hacking, what motivates young people today to think outside the box in a world where infosec is increasingly becoming vocational and expected. Vamosi: There’s also a list of words commonly used in infosec that are being challenged. Vamosi: Hackers. Yes, we show you know this.

Hacking 52
article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

And, there’s thirty more villages including Girls Hack Village, the Voting Machine Hacking village, the IoT Village, and the Bio Hacking village. Vamosi: I first attended DEF CON in 2000 when it was still at the Alexis Park Hotel, just off the Strip. We get the InfoSec people that that were on enterprise systems.

Hacking 40