Remove Course Remove Examples Remove Security Remove Video
article thumbnail

Secure Together: video conferencing, credential stuffing and eye strain

IT Governance

Maybe you feel less guilty about having a mid-morning video chat with a colleague in lieu of your normal coffee break. The video conferencing platform Zoom has been heavily criticised in recent weeks , amid a series of allegations related to its inadequate cyber security and privacy measures. Cyber attacks. Expert advice.

Security 124
article thumbnail

Episode 257: Securing Software on Wheels with

The Security Ledger

In this episode of The Security Ledger Podcast (#257) Paul speaks with Dennis Kengo Oka, a senior principal automotive security strategist at the firm Synopsys about the growing cyber risks to automobiles as connected vehicle features proliferate in the absence of strong cybersecurity protections. Read the whole entry. »

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Pluralsight Course: Modern Browser Security Reports

Troy Hunt

Rounding out a recent spate of new Pluralsight courses is one final one: Modern Browser Security Reports. In fact, we recorded this course in London only a few days after that pic was taken (although admittedly in a less well-dressed fashion). I hope you enjoy our course, Modern Browser Security Reports is now live!

article thumbnail

EDPB Adopts Guidelines on Data Processing Through Video Devices

Hunton Privacy

The European Data Protection Board (the “EDPB”) recently adopted its Guidelines 3/2019 on processing of personal data through video devices (the “Guidelines”). Although the Guidelines provide examples of data processing for video surveillance, these examples are not exhaustive.

GDPR 57
article thumbnail

Why your IT team needs cyber security training

IT Governance

Organisations often fall into the trap of lumping cyber security together with their other IT functions. Although they are obviously connected – anti-malware, firewalls and a host of other technologies are a core part of cyber security – there is a lot more to it. What they need is a wider understanding of cyber security.

IT 96
article thumbnail

New Pluralsight Course: OWASP Top 10, 2017

Troy Hunt

Just a tad over 5 years ago, I released my first ever Pluralsight course - OWASP Top 10 Web Application Security Risks for ASP.NET. Developers have a huge appetite for OWASP content and I'm very happy to now give them even more Top 10 goodness in the course I'm announcing here - Play by Play: OWASP Top 10 2017.

article thumbnail

Don’t Let Zombie Zoom Links Drag You Down

Krebs on Security

Many organizations — including quite a few Fortune 500 firms — have exposed web links that allow anyone to initiate a Zoom video conference meeting as a valid employee. Following the previous example, such a link might look something like this: zoom.us/j/5551112222/pwd=jdjsklskldklsdksdklsdkll