article thumbnail

CISO workshop slides

Notice Bored

A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.

CISO 63
article thumbnail

Herjavec Group Wins 4 Cyber Defense Magazine Global InfoSec Awards

Herjavec Group

Herjavec Group supports the Assessment, Design, Deployment, and Management of your IAM solutions through a comprehensive offering including Strategic Workshops, Advisory Services, Architecture & Implementation, and Managed IAM. About CDM InfoSec Awards . Learn more? Learn more at www.cyberdefenseawards.com .

InfoSec 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

PPP wanted to give their past high school selves the infosec education they didn’t have. Megan Kerns of Carnegie-Mellon University joins The Hacker Mind to talk about the early days and the continued evolution of this popular online infosec competition site. in InfoSec however, learning happens 365 days a year.

Hacking 52
article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

In information security (infosec) there is the need to be on the latest version. Writing exploits or developing infosec tools is no exception, they often need to have access to the latest libraries. ARM - multi architecture Since BackTrack 4, the option was there for ARM support. This helps make the system more robust.

InfoSec 52
article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

Increasingly, I was writing about what I thought was a pretty fascinating segment of the infosec industry; password reuse across Gawker and Twitter resulting in a breach of the former sending Acai berry spam via the latter. haveibeenpwned you guys are legends.

article thumbnail

Democratizing Threat Hunting: How to Make it Happen for Everyone

Cisco Security

However, when you are assigning architectural controls to mitigate that risk, it lacks validation. In fact, this report will change how we think about running infosec programs.”. Attend a Threat Hunting Workshop. In time, tech refresh and threat hunting should be part of the standard security approach in all organizations.

Risk 103