Remove 10
Remove 2010 Remove 2014 Remove Events Remove Security Remove Video
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

million records on US consumers (this started a series events which ultimately led to me testifying in front of Congress ), South Africa had data on everyone living in the country (and a bunch of deceased folks as well) leaked by a sloppy real estate agent and data from Australia's Medicare system was being sold to anyone able to come up with $30.

Security 111
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Srivastav 2014, p 18). Commissioned by organizers to predict worst-case scenarios for the Munich games, [Georg] Sieber came up with a range of possibilities, from explosions to plane crashes, for which security teams should be prepared. Risk Management and DT Experience. Uncertainty and risk are not the same. 2020, p 1).

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

And if you're going for a certification like CISSP Computer Information Systems Security Professional, you'll need to have a breadth of experience across multiple domains. So while you may be particularly skilled in security architecture and engineering. For example, when learning a new subject area. One of the best known starters CTF.