Remove Book Remove Hacking Remove InfoSec
article thumbnail

"Pwned", the Book, is Finally Here!

Troy Hunt

which I've now included in this book 😊 These are the stories behind the stories and finally, the book about it all is here: I announced the book back in April last year after Rob, Charlotte and I had already invested a heap of effort before releasing a preview in October. This book has it all. Pat Phelan.

InfoSec 363
article thumbnail

Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book

Security Boulevard

Discover the latest on her new book about secure coding, exciting updates in Application Security, and the use of AI in security. Learn how her new book goes deeper into secure coding practices, backed by her [] The post Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book appeared first on Shared Security Podcast.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are our infosec controls sufficient?

Notice Bored

begging questions about which infosec-related matters are particularly important, and how they stack up in relation to other business priorities, issues, pressures etc. In addition to the technical and human aspects of infosec, there are broader governance, strategic and commercial implications of [information] risk management and assurance.

InfoSec 63
article thumbnail

The State of Data Breaches

Troy Hunt

And that's the problem: a data breach circulating broadly on a popular clear web hacking forum doesn't mean the incident is known by the corporate victim. Blame was laid firstly at those who obtained the data, then at me for my reporting of the incident (my own disclosure was absolutely "by the book").

article thumbnail

Analysis of the 2020 Verizon Data Breach Report

Daniel Miessler

Verizon’s Breach Report is one of the best infosec reports out there, and I’m always excited when I hear it’s been released. 45% of breaches involved Hacking. Hacking, social, and malware have fallen the most. Hacking types and vectors. Within hacking, web applications accounted for over 95% of breaches.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

Booth babes and rampant sexism were more of a problem in infosec in the past. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. It’s about challenging our expectations about the people who hack for a living. That is, until Chenxi Wang spoke up.

InfoSec 40
article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

Is hacking a crime? Bryan McAninch (Aph3x) talks about his organization, Hacking Is Not A Crime , and the ethical line it draws on various hacking activities. I used to hack the phone company quite a bit. The 33 year old from suffer faced charges from US prosecutors as hacking into computers at various American agencies.

Hacking 52