Remove tag do-not-call
Remove Events Remove Security Remove Workshop
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. million InfoSec professionals, as of early 2021 How can that be part of the problem lies in the training pipeline, we really have to do a much better job with that. Apparently plenty.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. million InfoSec professionals, as of early 2021 How can that be part of the problem lies in the training pipeline, we really have to do a much better job with that. Apparently plenty.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

And if you're going for a certification like CISSP Computer Information Systems Security Professional, you'll need to have a breadth of experience across multiple domains. So while you may be particularly skilled in security architecture and engineering. So I called up someone from pico CTF, to learn more.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

million records on US consumers (this started a series events which ultimately led to me testifying in front of Congress ), South Africa had data on everyone living in the country (and a bunch of deceased folks as well) leaked by a sloppy real estate agent and data from Australia's Medicare system was being sold to anyone able to come up with $30.

Security 111
article thumbnail

The Hacker Mind Podcast: How To Become A 1337 Hacker

ForAllSecure

Hacking has an event that’s similar. They’re called Capture the Flag competitions. Okay, so how do you learn to think outside the box and become an elite hacker? Vamosi: So how do you become a legit elite hacker? These computers capture the flag events which are loosely based on the children’s game.

article thumbnail

The JavaScript Supply Chain Paradox: SRI, CSP and Trust in Third Party Libraries

Troy Hunt

This tag was in the source code over at secure.donaldjtrump.com/donate-homepage yet it was pulling script directly off Igor Escobar's GitHub repository for the project. What could you do if you could modify that script and subsequently cause your own arbitrary JavaScript to execute on Trump's website? So how do we fix it?