article thumbnail

CISO workshop slides

Notice Bored

Security Posture suggests a confusing mix of application and account security metrics. I'm really not sure what ' security posture ' even means in this context, and curious as to why those two aspects in particular have been selected as example metrics. including security-relevant aspects ( e.g. being a trusted partner).

CISO 63
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. When I look at nuclear submarines and the software that runs them, it has to be zero defect, because lives are at risk. Certainly there is a higher level of risk compared to any other type of normal app.

Hacking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. When I look at nuclear submarines and the software that runs them, it has to be zero defect, because lives are at risk. Certainly there is a higher level of risk compared to any other type of normal app.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. When I look at nuclear submarines and the software that runs them, it has to be zero defect, because lives are at risk. Certainly there is a higher level of risk compared to any other type of normal app.

Hacking 40