article thumbnail

The Presenting Vendor Paradox

Daniel Miessler

This presenter is just talking their own book! Many conference schedules, however, are full of talks from people who work at vendors. Conversely, people in the crowd at these conferences often have two complaints about the content. There isn’t enough good content, or. They sell service!

Mobile 353
article thumbnail

From Past to Present: User Authentication’s Evolution and Challenges

Security Boulevard

The post From Past to Present: User Authentication’s Evolution and Challenges appeared first on Security Boulevard. From the humble beginnings of legacy authentication mechanisms to today's sophisticated technologies, the journey of user authentication has been a captivating evolution marked by relentless innovation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

I Actually Like Remote and Pre-recorded Presentations

Daniel Miessler

I think people who love presenting live are actually in love with presenting as much or more than what they’re presenting. That’s not shade because I also enjoy giving and attending live presentations. But unlike John, I don’t see the studio version of presentations as inferior to the live versions.

InfoSec 229
article thumbnail

LDAPWordlistHarvester: generate a wordlist from the information present in LDAP

Penetration Testing

LDAPWordlistHarvester A tool to generate a wordlist from the information present in LDAP, in order to crack non-random passwords of domain accounts. ... The post LDAPWordlistHarvester: generate a wordlist from the information present in LDAP appeared first on Penetration Testing.

article thumbnail

Book Review: Present Future — Business, Science and the Deep Tech Revolution

Lohrman on Security

Guy Perelmuter offers an insightful, easy to read, helpful guide to present and future technology in business areas ranging from the future of jobs to AI and from cryptocurrencies to quantum computing.

article thumbnail

Nearly half of enterprise endpoint devices present significant security risks

Tech Republic Security

The post Nearly half of enterprise endpoint devices present significant security risks appeared first on TechRepublic. Organizations are struggling to manage devices and stay ahead of vulnerabilities, patches and attacks, according to a new report from Adaptiva and the Ponemon Institute.

Risk 166
article thumbnail

CISO’s Guide to Presenting Cybersecurity to Board Directors

CyberSecurity Insiders

To ensure cybersecurity becomes a strategic part of the corporate culture, it is crucial for CISOs to present the topic in a clear, concise, and compelling manner. Board members are not necessarily experts in cybersecurity, so it is important to present information in a way that is easily digestible and resonates with them.