Remove category threat-modeling-book
article thumbnail

Reflective Practice and Threat Modeling (Threat Model Thursday)

Adam Shostack

Lately, I’ve been asking what takes threat modeling from a practice to a mission. If you’re reading this blog, you may have seen that some people are nearly mad about threat modeling. The ones who say “you’re never done threat modeling.” Real threat models.

IT 80
article thumbnail

CyberheistNews Vol 13 #14 [Eyes on the Prize] How Crafty Cons Attempted a 36 Million Vendor Email Heist

KnowBe4

Blog post with screenshots and links: [link] [Live Demo] Ridiculously Easy Security Awareness Training and Phishing Old-school awareness training does not hack it anymore. Blog post with screenshots and links: [link] A Master Class on IT Security: Roger A. Protecting your network from this growing threat is more important than ever.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Strategic, the Tactical, and Agile Records Management

Brandeis Records Manager

The content in this blog reflects the opinions of the author, and not of Brandeis University.). We are experiencing such fast and fundamental shifts in the record generation, stewardship, and threat environments that strictly long-term eyeglasses, rather than bifocals, can harvest tomorrow’s stale and musty failures. The Tactical.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. I can dream about being different because there are white male role models. model, but you know, that's men. Around 2014 Chenxi authored a blog , which was very important for the industry in my opinion.

Cloud 40
article thumbnail

CyberheistNews Vol 13 #11 [Heads Up] Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears

KnowBe4

The title said it all, and the news is that more than 4% of employees have put sensitive corporate data into the large language model, raising concerns that its popularity may result in massive leaks of proprietary information. I'm giving you a short extract of the story and the link to the whole article is below.

article thumbnail

Privacy as a “Fundamental Right” Clouds Smart Regulation

Data Matters

As discussed in the chapters of this book, significant new laws are being adopted or taking effect, important judicial decisions are being decided to interpret existing legal requirements, and citizens are contending with their own expectations about confounding new technologies and business models.

Privacy 74