Remove Account Security Remove Cybersecurity Remove Hacking Remove InfoSec
article thumbnail

CISO workshop slides

Notice Bored

Security Posture suggests a confusing mix of application and account security metrics. I'm really not sure what ' security posture ' even means in this context, and curious as to why those two aspects in particular have been selected as example metrics.

CISO 63
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Jared DeMott of VDA Labs talks about his work securing voter registration tablets and also about the prospects for downloadable, safe voting applications on your preferred mobile device in the future. Listen to EP 08: Hacking Voting Systems. They invited us and other members of the public to try to hack it. Apple Podcasts.

Hacking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Jared DeMott of VDA Labs talks about his work securing voter registration tablets and also about the prospects for downloadable, safe voting applications on your preferred mobile device in the future. Listen to EP 08: Hacking Voting Systems. They invited us and other members of the public to try to hack it. Apple Podcasts.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Jared DeMott of VDA Labs talks about his work securing voter registration tablets and also about the prospects for downloadable, safe voting applications on your preferred mobile device in the future. Listen to EP 08: Hacking Voting Systems. They invited us and other members of the public to try to hack it. Apple Podcasts.

Hacking 40