Remove Data breaches Remove Events Remove Military Remove Mining
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. that the crooks were only able to mine a paltry $24 – which Coinhive refused to pay out anyway. Hello and welcome to the final IT Governance podcast of 2018.

article thumbnail

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

Originally Featured in Global Military Communications Magazine’s June/July Issue. Question: Can you provide an overview of the 2018 Thales Data Threat Report, Federal Edition, and elaborate why it’s needed today more than ever? This year’s report is especially relevant because it tells us federal agency data is under siege.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Communities

ForAllSecure

It was also designed under President Eisenhower to move military troops and vehicles from point A to point B, but that's another story. You see, Mills, you see cotton gins, you see mines that have shut down, you see places and every now and then there's somewhat of a success story. Some of the stories are known but you.

Mining 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

This was a few months after the Jeep Cherokee hack and that event had the entire industry’s attention. ” So it’s not surprising that this recording coincided with another major security event. ” So it’s not surprising that this recording coincided with another major security event. “Hi, Rob.”

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

This was a few months after the Jeep Cherokee hack and that event had the entire industry’s attention. ” So it’s not surprising that this recording coincided with another major security event. ” So it’s not surprising that this recording coincided with another major security event. “Hi, Rob.”

IT 52
article thumbnail

EP 49: LoL

ForAllSecure

Vamosi: Whenever there's a data breach, a ransomware attack, large security event in general, I would like to learn something about how it happened. So why don't I do some side look why don't I use these legitimate tools so comes up in loads of applications, you know, kindly low mine hours. Vamosi: So it's interesting.