article thumbnail

CISO workshop slides

Notice Bored

Security Posture suggests a confusing mix of application and account security metrics. I'm really not sure what ' security posture ' even means in this context, and curious as to why those two aspects in particular have been selected as example metrics.

CISO 63
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Things like newer technologies like botching as well as biometrics. Not that biometrics is newer, but it's still really not broadly used in the security field because of any concerns that people do have.

Hacking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Things like newer technologies like botching as well as biometrics. Not that biometrics is newer, but it's still really not broadly used in the security field because of any concerns that people do have.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Things like newer technologies like botching as well as biometrics. Not that biometrics is newer, but it's still really not broadly used in the security field because of any concerns that people do have.

Hacking 40