article thumbnail

Y2k + 20: risk, COVID and "the Internet issue"

Notice Bored

For a long time prior to the year 2000, a significant number of software programmers had taken the same shortcut we all did back in "the 90s". which leaves our organisations, management and society at large asking themselves "What have the infosec pros ever done for us? IT and infosec pro's aren't. We had all that back in 99.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Vamosi: DEF CON turns 30 This year what began simply as a going away party for a coworker has since evolved over the decades into an annual summer tradition for InfoSec leaders in Las Vegas, which now includes other events such as besides Las Vegas, Diana is known as hackers summer camp. Again, all all around the InfoSec community.

Hacking 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. You want to make sure the devices used are hardened, they don’t have unnecessary outside access, that they are kept up-to-date with their software, firmware, etc. I’m talking about the totality of the voting system.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. You want to make sure the devices used are hardened, they don’t have unnecessary outside access, that they are kept up-to-date with their software, firmware, etc. I’m talking about the totality of the voting system.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. You want to make sure the devices used are hardened, they don’t have unnecessary outside access, that they are kept up-to-date with their software, firmware, etc. I’m talking about the totality of the voting system.

Hacking 40