Remove perspective why-we-need-a-zero-trust-certification-program
article thumbnail

CISSPs from Around the Globe: An Interview with James Wright

CyberSecurity Insiders

The Certified Information Systems Security Professional (CISSP) certification is considered to be the gold standard in information security. This is so because of all the doors that certification opens to a CISSP professional. In our last interview, we met Jason Lau. In this installment, we meet James Wright.

article thumbnail

The Weakest Link: Managing Supply Chain Risk

Approachable Cyber Threats

The frequency and severity of supply chain attacks have increased significantly in recent years, plaguing even the most robust cybersecurity programs as evidenced by the following statistics. Why does it seem like supply chain attacks are increasing? What are supply chain attacks?

Risk 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Future of Work without Workers

CyberSecurity Insiders

This comes in great measure because of the classic dilemma of needing up-to-date technical skills along with years of formal experience in the industry. Two realities are clearly evident as we look to the future-of-work. The first is that the need for cybersecurity specialists has never been greater. reached a peak of 4.3

article thumbnail

The Weakest Link: Managing Supply Chain Risk

Approachable Cyber Threats

The frequency and severity of supply chain attacks have increased significantly in recent years, plaguing even the most robust cybersecurity programs as evidenced by the following statistics. Why does it seem like supply chain attacks are increasing? What are supply chain attacks?

Risk 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Within 48 hours at the start of the test, we had complete control over their voting servers and were able to change all the votes. We even rigged the system to play the Michigan Fight Song every time somebody voted. In 2010, she was interviewed by O'Reilly Media. Alex Halderman, a professor who was then with the University of Michigan.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Within 48 hours at the start of the test, we had complete control over their voting servers and were able to change all the votes. We even rigged the system to play the Michigan Fight Song every time somebody voted. In 2010, she was interviewed by O'Reilly Media. Alex Halderman, a professor who was then with the University of Michigan.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Within 48 hours at the start of the test, we had complete control over their voting servers and were able to change all the votes. We even rigged the system to play the Michigan Fight Song every time somebody voted. In 2010, she was interviewed by O'Reilly Media. Alex Halderman, a professor who was then with the University of Michigan.

Hacking 40