Remove topic work-life
article thumbnail

Interview: Joseph Steinberg, CyberSecurity Expert and Author

Joseph Steinberg

In his recent interview with Utopia, CyberSecurity Expert Joseph Steinberg touched on various interesting elements of his personal life, the field of cybersecurity and cybersecurity technologies in general, and his best-selling book “Cybersecurity For Dummies.”. However, why did you decide to deal with this topic?

article thumbnail

Weekly Update 229

Troy Hunt

But I digress; this week's update consists of some brief discussion around data breaches and yesterday's blog post on how I like to meet, followed by a lot of audience engagement on the topic of IoT. I really enjoyed that and it went on a lot longer than planned, I hope you get something out of it too.

IoT 274
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

November Blog a Day Reflections

Javvad Malik

Being my own blog and not having to adhere to someone else’s arbitrary guidelines of word-count or topic, I found it a liberating, and quite therapeutic experience. It’s quite nice to put down your thoughts and see them come to life. It definitely helped me to clarify some of my own thinking or get things off my chest.

CISO 208
article thumbnail

HEALTHCARE SECURITY – SECURITY WITH LIFE AND DEATH CONSEQUENCES

CyberSecurity Insiders

A Day in the Life. These topics, as well as endless meetings to explain password security and risk management can suck the enthusiasm out of the most passionate security advocate. Not as glamorous as the detective work, but equally necessary for an effective security program. Why is this the case? Sometimes, There Is Blood!

article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

But there is a fascinating and untold backstory behind the two Russian men involved, who co-ran the world’s top spam forum and worked closely with Russia’s most dangerous cybercriminals. KrebsOnSecurity began researching Icamis’s real-life identity in 2012, but failed to revisit any of that research until recently.

article thumbnail

Cybersecurity Re-Launchers: Pivoting into Cybersecurity as a Mid-Career Professional

Cisco Security

If you are passionate about the topic and are ready to put in the work to acquire the skills and knowledge needed, anyone, regardless of educational background, can break into cybersecurity. I got introduced to the field by chance after working in data analytics for a few years and taking a college class on criminology.

article thumbnail

Chatbots and Human Conversation

Schneier on Security

But as chatbots become a ubiquitous element of modern life and permeate many of our human-computer interactions, they have the potential to subtly reshape how we think about both computers and our fellow human beings. Several companies are working on AI assistants, akin to secretaries or butlers, that will anticipate and satisfy our needs.