Remove 2000 Remove InfoSec Remove Internet Remove Technology
article thumbnail

Weaving strategies with policies

Notice Bored

Globalization' is not just about establishing a widespread physical presence and brands: it's also about harnessing a widely distributed and culturally diverse workforce, harnessing technology to link, leverage and exploit the very best of the best. What about the technology risks, not least our ever-increasing dependence on the Internet?

Risk 66
article thumbnail

2021 Hispanic Heritage Month Pt. 1: A Celebration of Hispanic Heritage and Hope

McAfee

He recognized my passion for infosec (it wasn’t called cyber back then) and provided me with the support needed to make my ideas and projects a reality. Thanks to him I was able to co-found one of the first infosec consulting businesses in Spain in 2000, and I’m still very grateful for that opportunity. it’s on LinkedIn too).

InfoSec 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Web Application Firewall (WAF) Vendors

eSecurity Planet

At the same time, WAF technology is increasingly a part of more comprehensive security solutions like next-generation firewalls (NGFW), unified threat management (UTM), and more. From the 1998 MIT Entrepreneurship Competition to today, Akamai Technologies is now a top provider of WAF solutions. Microsoft Azure. Signal Sciences.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

That, of course, was not all, but it is an example of how someone -- anyone on the internet -- can take a photo or blog post or Yelp review from social media, or some other seemingly random open source item and tie it back to a crime. Which then I could configure to get on the internet, you know. Daniel, he keeps a low profile.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

He also talks about the future generation of hacking, what motivates young people today to think outside the box in a world where infosec is increasingly becoming vocational and expected. Vamosi: There’s also a list of words commonly used in infosec that are being challenged. Vamosi: Hackers. Yes, we show you know this.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

held a pilot of a new Internet voting system. The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. More individual states’ voting systems were exposed and also addressable from the internet. Things like newer technologies like botching as well as biometrics.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

held a pilot of a new Internet voting system. The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. More individual states’ voting systems were exposed and also addressable from the internet. Things like newer technologies like botching as well as biometrics.

Hacking 52