Remove Definition Remove Demo Remove Military Remove Security
article thumbnail

ForAllSecure Launches The Hacker Mind Podcast

ForAllSecure

In the inaugural episode, The Hacker Mind looks at why the West Point Military Academy, and other organizations within the DoD, is training its young cadets to hack. Or maybe, just maybe back in 2014, West Point and other military service academies, are on to something really important. The military has these massive computer networks.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

In fact, I remember starting a new job by flying to Auburn Hills, Michigan for the very first meeting of the Featherstone Group, a collection of automotive OEM executive and security professionals. Steve Grobman, CTO with Intel’s security group had this to say: CNBC: Yeah, so I think that nothing is ever impossible.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Why Are Blue Team Hackers More L33T?

ForAllSecure

So you’re in your SOC, your security operations center. In your role, you have to see that everything is secure, 24/7, and think of every crazy attack vector, but for a hacker, they only have to find that one fault--and then they’re inside. Manka: I spent about seven-ish years working at the National Security Agency.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

While digital voting systems are more secure today, what about the larger ecosystem, starting from the moment you register until your vote is counted? Who’s keeping those systems secure? Clearly having individual vendors provide the security wasn’t working, so the state moved toward adopting open source software.

article thumbnail

CyberheistNews Vol 13 #23 [Wake-Up Call] It's Time to Focus More on Preventing Spear Phishing

KnowBe4

A new, HUGE, very important, fact has been gleaned by Barracuda Networks which should impact the way that EVERYONE does security awareness training. Within that definition, spear phishing can be accomplished in thousands of different ways, ranging from basic attacks to more advanced, longer-range attacks. This is that fact: ".spear