article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

How to screen for natural infosec talent: Ask for a worst case scenario for any common situation. Street is an industry-respected speaker and analyst and currently is the VP of InfoSec for SphereNY. Markstedter actively contributes to filling the infosec education gap. — Jack Daniel (@jack_daniel) October 10, 2018.

article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

Enter Project 2030, a collaboration between Oxford Visiting Researcher Victoria Baines and Trend Micro Vice President of Security Research Rik Ferguson, which uses a mixture of survey data and forward-thinking understanding of technology to predict the infosec concerns a decade from now. AI could impact more than just social engineering.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

Wednesday 13th, March 2013, 10 years ago, Kali Linux v1.0 A fresh start in March 2013. BackTrack Linux became Kali Linux in March 2013. Moto) first saw the light of day at Black Hat Europe 2013 and was based on Debian 7. In information security (infosec) there is the need to be on the latest version.

InfoSec 52
article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

AttackIQ calls San Diego, California, home and started as an automated validation platform in 2013. DXC Technology has over 40 years of infosec experience, most of which as HPE’s Enterprise Services. Picus Security is a continuous security validation vendor located in San Francisco and founded in 2013. FireEye’s Mandiant.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. No infosec Twitter or Discord. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. I started in journalism. Stok, he also started out more with more humble interests.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. No infosec Twitter or Discord. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. I started in journalism. Stok, he also started out more with more humble interests.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. No infosec Twitter or Discord. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. I started in journalism. Stok, he also started out more with more humble interests.

Hacking 40