Remove Book Remove InfoSec Remove IoT
article thumbnail

"Pwned", the Book, is Finally Here!

Troy Hunt

which I've now included in this book 😊 These are the stories behind the stories and finally, the book about it all is here: I announced the book back in April last year after Rob, Charlotte and I had already invested a heap of effort before releasing a preview in October. This book has it all. Pat Phelan.

InfoSec 362
article thumbnail

Daniel Miessler on My Writings about IoT Security

Schneier on Security

Daniel Miessler criticizes my writings about IoT security: I know it's super cool to scream about how IoT is insecure, how it's dumb to hook up everyday objects like houses and cars and locks to the internet, how bad things can get, and I know it's fun to be invited to talk about how everything is doom and gloom. Yes, definitely.

IoT 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: Sternum and ChargePoint collaborate to enhance ChargePoint Home Flex Security

The Last Watchdog

23, 2024 — Sternum, the pioneer in embedded IoT security and observability, today announced enhanced security for the ChargePoint Home Flex. Thanks to the analysis and help of Sternum IoT, ChargePoint was able to correct weaknesses in CPH50, reduce the attack surface and thus improve the security of the product.

IoT 100
article thumbnail

The Rise of Data Sovereignty and a Privacy Era

SecureWorld News

Stay abreast of: Current trends such as Zero Trust, Cloud Security, IoT Security, Ransomware, Supply Chain Security, BYOD / Mobile Security, etc. Building a strong incident response plan with play books and calibrating regularly via tabletop exercises with cross functional stakeholders is paramount.

IoT 107
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

Booth babes and rampant sexism were more of a problem in infosec in the past. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. WANG : In leadership roles, I don't know that I think the overall percentage of women in cyber InfoSec is like 22%.

InfoSec 40
article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

They discuss how software and IoT companies can avoid becoming the next Black Mirror episode and share resources that can help survivors (and those who want to help them) deal with the technology issues that can be associated with technologically facilitated abuse. But what about IoT devices? Both involve people getting hurt.

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

Raymond, from his 1999 book The Cathedral and the Bazaar. Particularly in IoT, where we find ourselves using MQTT and other ancient protocols, not for what they were originally designed for, but for our immediate need for lightweight communications among devices. But it’s actually from Eric S.