article thumbnail

CISO workshop slides

Notice Bored

A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.

CISO 63
article thumbnail

Weekly Update 71 (Denmark Edition)

Troy Hunt

I talk about that below including the preceding days involving some pretty full on sledding in Norway, workshops, talks, ice, slush and snow. Plus, of course, the actual infosec stuff from the week namely my new Pluralsight course on creating a security-centric culture. iTunes podcast | Google Play Music podcast | RSS podcast.

InfoSec 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

Shrink the attack surface by reducing password usage with passwordless SSO and make it faster and more convenient for users to get to the apps they need – whether SaaS-based or private. For strategic guidance and access to hands-on labs, register for one of our free Zero Trust Workshops. ZTNA) – regardless of location or protocol.

article thumbnail

2018 Retrospective

Troy Hunt

So yes, travel went up but I also did a bunch of remote workshops which helped keep that down, as well sending Scott Helme to run in-person ones that contributed to keeping me on Aussie soil. SSW in Sydney: How safe is your #password ?! TECHpalooza on the Gold Coast: We’ve got a password problem. troyhunt is here to help.

Passwords 205
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Much of this is simply due to lack of awareness; I must have taught 50 security workshops where the vast majority of attendees had simply never heard of CSP before. This is poor form as it can break tools that encourage good security practices such as password managers. Let them paste passwords! Why do websites do this?

Hacking 279
article thumbnail

Beg Bounties

Troy Hunt

They'd left a MongoDB instance exposed to the public without a password and someone had snagged all their data. When someone passed me hundreds of thousands of records on kids taken from CloudPets a few years ago , I had a nightmare of a time getting in touch with the company.

Scams 69
article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

Fortunately, there are those in the InfoSec world, who are actively looking at the subject and speaking out at conferences, such as Black Hat. Vamosi: That talk focused on the fact that there are InfoSec hackers openly working to address this problem. Black Mirror brainstorms, a workshop in which you create Black Mirror episodes.