Remove Book Remove CSO Remove Penetration Testing
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more. Excited to announce that @codingo_ and I are currently working on “The Bug Hunter’s Methodology” book. Bruce Schneier | @schneierblog.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

She has 15 years of experience, and yet she's not a CSO at any large organization, rather than curse her fate, she decided to help others, so that maybe they can become the CSOs, and just maybe start to address the diversity problem in InfoSec. In a moment we'll meet a woman who has four graduate degrees in it, plus an MBA.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

She has 15 years of experience, and yet she's not a CSO at any large organization, rather than curse her fate, she decided to help others, so that maybe they can become the CSOs, and just maybe start to address the diversity problem in InfoSec. In a moment we'll meet a woman who has four graduate degrees in it, plus an MBA.

Hacking 40