article thumbnail

Real Talk with CCSPs: An Interview with Panagiotis Soulos

CyberSecurity Insiders

I was motivated by another student who was about to take the master's degree for network security in the UK at Royal Holloway. That's where I was mainly involved with cybersecurity risk and vulnerability assessments, and then overseeing the information security policy. I always enjoy hearing him, and I have met him.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Security technologist Bruce Schneier was respected long before the launch of Twitter. His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more. Bruce Schneier | @schneierblog. Jayson E.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Emotions Used in Social Engineering Attacks [with Examples]

SecureWorld News

He writes about this in his book, "Ghost in the Wires": "I would call the company I'd targeted, ask for their computer room, make sure I was talking to a system administrator, and tell him, 'This is [whatever fictitious name popped into my head at that moment], from DEC support. Hacker targets victims with fear.

article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

When people feel threatened by it they want to throw the book at Yeah. I wrote a book with Kevin Mitnick, a convicted felon. I was a coder by nature, but I got into networking security and picked up Linux. And when people don't understand something they feel threatened by it. There wasn't as much specialization.

Hacking 52
article thumbnail

New York: Cyberattack Is Twitter's Fault, Let's Increase Regulation

SecureWorld News

I still remember reading hacker Kevin Mitnick's book "Ghost in the Wires" a few years ago. I would call the company I'd targeted, ask for their computer room, make sure I was talking to a system administrator, and tell him, 'This is [whatever fictitious name popped into my head at that moment], from DEC support.