article thumbnail

December’s Reimagining Democracy Workshop

Schneier on Security

The modern representative democracy was the best form of government that mid-eighteenth-century technology could conceive of. Again, we have more technology and therefor more options. In December 2022, I organized a workshop to discuss these and other questions. On the other hand, technological solutionism regularly fails.

article thumbnail

CISO workshop slides

Notice Bored

Security Posture suggests a confusing mix of application and account security metrics. I'm really not sure what ' security posture ' even means in this context, and curious as to why those two aspects in particular have been selected as example metrics.

CISO 63
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Seven things to considering Account-Based Marketing– My Thales ABM Journey

Thales Cloud Protection & Licensing

Seven things to considering Account-Based Marketing– My Thales ABM Journey. Back in March, as I was getting ready to come back from maternity leave, I was offered the chance to embark on a new and exciting career journey: piloting Account-Based Marketing for the Thales CPL EMEA region. Thu, 08/04/2022 - 06:04.

article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

So here it is - 10 Personal Financial Lessons for Technology Professionals. For example, the ICT industry (Information, Communication, Technology) was the 5th highest paying with an average salary of $104,874 (dollars are Aussie, take off about 30% for USD). Intro: This Industry Rocks! Banking is below that. Medical even lower.

article thumbnail

Data Enrichment, People Data Labs and Another 622M Email Addresses

Troy Hunt

For example, there's Dun & Bradstreet's NetProspex which leaked 33M records in 2017 , Exactis who had 132M records breached last year and the Apollo data breach which exposed 126M accounts, one of which was my own. i speak at conferences around the world and run workshops on how to build more secure software within organisations.

article thumbnail

Database of the FBI’s InfraGard US Critical Infrastructure Intelligence portal available for sale

Security Affairs

Through seamless collaboration, InfraGard connects owners and operators within critical infrastructure to the FBI, to provide education, information sharing, networking, and workshops on emerging technologies and threats. The attacker applied for an account in November and by early December the account had been surprisingly approved.

article thumbnail

InfraGard infiltrated by cybercriminal

Malwarebytes

The FBI provides education, information sharing, networking, and workshops on emerging technologies and threats. False account. When asked, the threat actor revealed that they gained access by registering a false account. ” The data. The stolen data are not earth-shattering.