Remove 2000 Remove Encryption Remove InfoSec Remove Technology
article thumbnail

Top Web Application Firewall (WAF) Vendors

eSecurity Planet

At the same time, WAF technology is increasingly a part of more comprehensive security solutions like next-generation firewalls (NGFW), unified threat management (UTM), and more. From the 1998 MIT Entrepreneurship Competition to today, Akamai Technologies is now a top provider of WAF solutions. Microsoft Azure. Signal Sciences.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Vamosi: DEF CON turns 30 This year what began simply as a going away party for a coworker has since evolved over the decades into an annual summer tradition for InfoSec leaders in Las Vegas, which now includes other events such as besides Las Vegas, Diana is known as hackers summer camp. And … you won’t be disappointed.

Hacking 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

He also talks about the future generation of hacking, what motivates young people today to think outside the box in a world where infosec is increasingly becoming vocational and expected. Vamosi: There’s also a list of words commonly used in infosec that are being challenged. Vamosi: Hackers. Yes, we show you know this.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Things like network encryption, certificate pinning - is this device domain joined or not? Things like newer technologies like botching as well as biometrics. I’m talking about the totality of the voting system.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Things like network encryption, certificate pinning - is this device domain joined or not? Things like newer technologies like botching as well as biometrics. I’m talking about the totality of the voting system.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Things like network encryption, certificate pinning - is this device domain joined or not? Things like newer technologies like botching as well as biometrics. I’m talking about the totality of the voting system.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Whether it’s designing or just playing CTFs, John Hammond knows a lot about the gamification of infosec. In the moment you’ll meet someone who’s been gamifying infosec for years. Included with that question was an encrypted text file which John downloaded then wrote a simple python script to decrypt it.