Remove tag do-not-call
article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

Vamosi: One sunny morning in 2013. I mean, there are so many positive stories about people who are hacking for a living and doing good things because of it. SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. Operational Security is typically a military process.

Privacy 52
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. My friend didn’t do so well that night. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Meet Stok; he’s one of them. So I did that.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. My friend didn’t do so well that night. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Meet Stok; he’s one of them. So I did that.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. My friend didn’t do so well that night. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Meet Stok; he’s one of them. So I did that.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Part 2 will discuss the critical factors for a successful DT journey, because organizations need to do a “mind-shift” from traditional records and information management (RIM) practices to content services (CS). Two years earlier, Vannevar Bush put forth the idea of an information system device he called ‘memex.’ Content Services (CS).

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Both during this week and over previous years, there's been various headlines calling the security posture of Aadhaar into question and the Indian government has been vehemently refuting any suggestion that the system isn't top notch. Many people are doing that just now, including myself regarding that "hack-proof" claim.

Security 111
article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

Over the years, Dan continued to do really great things. Like he created an app for people with color blindness called the DanKam. He called it Time Stone. So what do we mean by managing all the hardware? It’s time to evolve beyond the UNIX operating system. You can learn more at dbos-project.github.io.