article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Allen is a widely respected thought leader on this topic, having launched Shared Assessments in 2005 as an intel-sharing and training consortium focused on third-party risks. Addressing third-parties Allen founded The Santa Fe Group in 1995 and established it as a leading consultancy, specializing on emerging technologies.

Risk 164
article thumbnail

Jeff Moss on the Evolution of Hacking at SecTor 2021

ForAllSecure

His talk was nostalgic, reflecting on the 40+ years of computer hacking. Moss also said that all hacking is not infosec and that all infosec is not hacking. “Hacking can provide a lot of joy and absolutely no income. But hacking, not so much. Where with infosec the goal is to produce income. It’s a job.

Hacking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

From January 2005 to April 2013, there were two primary administrators of the cybercrime forum Spamdot (a.k.a From one of his ads in 2005: Domains For Projects Advertised By Spam I can register bulletproof domains for sites and projects advertised by spam(of course they must be legal). One such site — sun-technology[.]net

article thumbnail

Canadian Flair Airlines left user data leaking for months

Security Affairs

Flyflair.com belongs to the Canadian ultra-low-cost carrier Flair Airlines, founded in 2005. Firstly, to research what information their target could store, what technologies and security measures they are using. The leak consisted of publicly accessible environment files hosted on the flyflair.com website. million monthly visitors.

article thumbnail

The Essential Guide to Radio Frequency Penetration Testing

Pen Test

Introduction Radio Frequency (RF) penetration testing, popularly referred to as RF pentesting, stands as a vital domain within ethical hacking. The rapid advancement of technology has woven a complex fabric of wireless networks, each interwoven with vulnerabilities waiting to be exposed. What is Radio Frequency (RF)?

article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

Here are the key takeaways: Lower-tier hacks. No organization wants to find itself having to recover from a devastating ransomware hack – or dealing with an unauthorized intruder who has usurped control of its operational systems. The ongoing waves of Microsoft Exchange ProxyLogon hacks are a good example of these lower-tier attacks.

article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

The Health Information Technology for Economic and Clinical Health Act (HITECH). New York Stop Hacks and Improve Electronic Data Security (SHIELD) Act. (NERC) standards. Title 21 of the Code of Federal Regulations (21 CFR Part 11) Electronic Records. Health Insurance Portability and Accountability Act (HIPAA).

CSO 128