article thumbnail

Hacking IoT Security with Aaron Guzman

Security Boulevard

Sources and Sinks interviews car hacker and IoT security expert, Aaron Guzman. Information security is no longer staying on our laptops and in our browsers. As our devices become increasingly interconnected too, we have to start thinking about the security of our IoT devices. Photo by Hiroyoshi Urushima on Unsplash.

IoT 105
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security. Vamosi: So what am I missing here. Here's an accomplished woman with five master's degrees and 15 years of experience in it.

Hacking 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security. Vamosi: So what am I missing here. Here's an accomplished woman with five master's degrees and 15 years of experience in it.

Hacking 40
article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

Conduct frequent security audits and penetration testing: Detect and resolve any vulnerabilities before they are exploited by fraudulent actors to minimize the likelihood of data breaches. ISO 27000 is a standard for information security and SOC is for maintaining consumer data integrity and security across several dimensions.

Risk 81
article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

Longer history lesson Knoppix - Initial two weeks work Whoppix (White-Hat and knOPPIX) came about as the founder, @Muts, was doing an in-person air-gap network penetration test lasting for two weeks in 2004. In information security (infosec) there is the need to be on the latest version. A fresh start in March 2013.

InfoSec 52