article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

Booth babes and rampant sexism were more of a problem in infosec in the past. I went to Black Hat in 2000. I know there was a period when several InfoSec people, myself included, said we will not be on panels unless there's diversity represented on said panel. That is, until Chenxi Wang spoke up. So I learned. And it should.

InfoSec 40
article thumbnail

Episode 232: Log4j Won’t Go Away (And What To Do About It.)

The Security Ledger

Tomislav tells us why issues related to Log4j won’t be going away anytime soon and how organizations must adapt to deal with the risk it poses. Tomislav tells us why issues related to Log4j won’t be going away anytime soon and how organizations must adapt to deal with the risk it poses. Supply Chain Risks: The New Normal.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weaving strategies with policies

Notice Bored

From the information risk and security perspective, virtual working is both a nightmare and, again, an opportunity. How can virtual working benefit information risk and security? What about the technology risks, not least our ever-increasing dependence on the Internet? What can be done to facilitate secure virtual working?

Risk 66
article thumbnail

‘I vowed I was going to teach people’: NPower’s trauma-informed training nurtures digital talent

SC Magazine

military and serving as deputy chief information security officer at Globe Life and global information security risk director at GM Financial. As an infosec leader, Vaughn witnessed first-hand the dearth of available IT talent that’s available to hire.

article thumbnail

Y2k + 20: risk, COVID and "the Internet issue"

Notice Bored

For a long time prior to the year 2000, a significant number of software programmers had taken the same shortcut we all did back in "the 90s". The combination of very high probability and catastrophic impact results in a risk up at the high end of a tall scale. Year values were often coded with just two decimal digits: 97, 98, 99.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And what parallels might infosec learn from COVID-19? In this episode, Mike Ahmadi draws on his years of experience in infosec, his years hacking medical devices. Using older software within your own software always carries risk. I’m really not kidding about the ubiquity of Mike in infosec. What if they don’t?

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And what parallels might infosec learn from COVID-19? In this episode, Mike Ahmadi draws on his years of experience in infosec, his years hacking medical devices. Using older software within your own software always carries risk. I’m really not kidding about the ubiquity of Mike in infosec. What if they don’t?