article thumbnail

Who Wants to Become a Guest Blogger At This Blog?

Security Boulevard

Are you interested in becoming a Guest Blogger on this blog where you will be able to reach out to one of the best and most diverse audience within the security industry since December, 2005 which consists of security experts researchers vendors and organizations including cybercrime researchers the U.S Let's make this happen!

article thumbnail

Jeff Moss on the Evolution of Hacking at SecTor 2021

ForAllSecure

Moss also said that all hacking is not infosec and that all infosec is not hacking. Where with infosec the goal is to produce income. ” This set up a basic dichotomy throughout his talk in that hacking doesn’t require professionalism just curiosity and Infosec does require professionalism but not always curiosity.

Hacking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Does Cybersecurity Awareness Month actually improve security?

Malwarebytes

I’ve been involved with events like this since 2005, and one time at a panel with reps from the FTC and the NYAG…. Some people get a lot of their security information from sources like Twitter, direct from infosec pros. From experience, the content in these events doesn’t tend to differ much from year to year.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

How to screen for natural infosec talent: Ask for a worst case scenario for any common situation. Street is an industry-respected speaker and analyst and currently is the VP of InfoSec for SphereNY. Markstedter actively contributes to filling the infosec education gap. — Jack Daniel (@jack_daniel) October 10, 2018.

article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

This lead into WHAX in 2005, which used Slax. Merging into BackTrack At the same time, there was a similar project happening over at remote-exploit, Auditor Security Collection (based on Knoppix), which first started in 2005. In information security (infosec) there is the need to be on the latest version.

InfoSec 52
article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

Having a common framework around vulnerabilities, around threats , helps us understand the infosec landscape better. Adam has more than 20 years in the infosec world, and he even helped create the CVE system that we all use today. SHOSTACK: So, um, you come again, came about, actually in 2005. STRIDE provides an easy mnemonic.

article thumbnail

The Hacker Mind Podcast: Hacking Biology

ForAllSecure

I often talk with hackers and discuss the day to day work, or even their specific InfoSec journey. Okay, maybe in the future episode. But anyway, the story is going to be a little bit different. So for example if you want to draw a rectangle, you need a canvas with a rectangle object.

Hacking 52