Remove Accountability Remove Technology Remove Workshop
article thumbnail

December’s Reimagining Democracy Workshop

Schneier on Security

The modern representative democracy was the best form of government that mid-eighteenth-century technology could conceive of. Again, we have more technology and therefor more options. In December 2022, I organized a workshop to discuss these and other questions. On the other hand, technological solutionism regularly fails.

article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

So here it is - 10 Personal Financial Lessons for Technology Professionals. For example, the ICT industry (Information, Communication, Technology) was the 5th highest paying with an average salary of $104,874 (dollars are Aussie, take off about 30% for USD). Intro: This Industry Rocks! Banking is below that. Medical even lower.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Enrichment, People Data Labs and Another 622M Email Addresses

Troy Hunt

For example, there's Dun & Bradstreet's NetProspex which leaked 33M records in 2017 , Exactis who had 132M records breached last year and the Apollo data breach which exposed 126M accounts, one of which was my own. i speak at conferences around the world and run workshops on how to build more secure software within organisations.

article thumbnail

WHEN IS CYBERSECURITY IS WEEK

Hacker's King

As technology continues to evolve, so too do the threats that target both individuals and organizations. Activities during this week include engaging workshops, informative webinars, and community events, all designed to empower individuals with the knowledge and skills necessary to navigate today’s cyber threats effectively.

article thumbnail

Banks, Arbitrary Password Restrictions and Why They Don't Matter

Troy Hunt

And while I'm here questioning CommBank's logic, what the hell is going on with this : 1Password has an open letter to banks on precisely this because its awful advice steeped in legacy misunderstandings of both technology and human brains. However, after 3 attempts of entering an Access Code your account will be blocked. Any thoughts?

Banking 272
article thumbnail

CISO workshop slides

Notice Bored

Security Posture suggests a confusing mix of application and account security metrics. I'm really not sure what ' security posture ' even means in this context, and curious as to why those two aspects in particular have been selected as example metrics.

CISO 63
article thumbnail

Fixing Data Breaches Part 1: Education

Troy Hunt

Security tends to be viewed as a discrete discipline within information technology as opposed to just natively bake into everything. In this case, "worst" is seriously bad news because the blog post also shows how to connect to the database with the sa account (i.e. "god People Don't Know What They Don't Know.