Remove Examples Remove Exercises Remove Military Remove Video
article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Tensions rose throughout February as the Russian military amassed across the Ukrainian border. Although Vladimir Putin and his sympathisers assured the world that they were simply conducting military exercises, the inevitable occurred on 24 February, when troops mobilised and war was declared. Then something strange happened.

Security 132
article thumbnail

The Hacker Mind Podcast: Cyber Ranges

ForAllSecure

So the threats that we look after are ones that you would see popular in the wild and against the customers that work large financial institutions, militaries, the US military, foreign militaries, NATO partners, how well do they defend and react against these threats? So the question is, what are the Russians up to?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. Operational Security is typically a military process. So in this episode, it's not really a handbook for criminal hackers or want to be terrorists, brother this is a purely academic exercise. Not so easy.

Privacy 52
article thumbnail

The Hacker Mind Podcast: How To Become A 1337 Hacker

ForAllSecure

Some, like Adam Van Prooyan, just kind of wandered into that path, in part because he was interested in computers, and also because the West Point Military Academy just happened to have a CTF team that competes in the annual Cyberstakes competition. Vamosi: So, not everyone is in a military academy. Cyber 600 and that was.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Often I would just use a screwdriver and break a toaster, for example, down to its smallest components, and then try and map out its circuitry. Hammond: I grew up, kind of like any kid like oh I want to make video games or oh I want to be a hacker, and they'll go online and kind of Google and research that sort of thing.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Often I would just use a screwdriver and break a toaster, for example, down to its smallest components, and then try and map out its circuitry. Hammond: I grew up, kind of like any kid like oh I want to make video games or oh I want to be a hacker, and they'll go online and kind of Google and research that sort of thing.