Remove 10
Remove 2017 Remove Examples Remove Exercises Remove Security Remove Training
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I remember seeing that a company wanted 10 years or more of Kubernetes experience. At the time of this podcast, Kubernetes hasn't yet been around for 10 years. There are studies that show that men are more likely to apply for jobs that ask for 10 years of Kubernetes experience than bluster their way through the job interview.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I remember seeing that a company wanted 10 years or more of Kubernetes experience. At the time of this podcast, Kubernetes hasn't yet been around for 10 years. There are studies that show that men are more likely to apply for jobs that ask for 10 years of Kubernetes experience than bluster their way through the job interview.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: How To Get Paid To Hack

ForAllSecure

And the rest, they say is this as a reporter, I was in a position to learn as I wrote about information security. Vamosi: Welcome to the hacker mind that original podcast from for all secure. Here's the crazy thing: prior to 2017 Prior to attending DEF CON 25 Stoke never tried his hand at bug bounty. I hope you'll stick around.

Mining 40
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. It kind of came on my radar somewhere around 2017. Stok: I went to DEF CON in 2017. and such.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. It kind of came on my radar somewhere around 2017. Stok: I went to DEF CON in 2017. and such.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. It kind of came on my radar somewhere around 2017. Stok: I went to DEF CON in 2017. and such.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

To pick just two recent examples of the latter, the EU’s General Data Protection Regulation1 (GDPR) and the California Consumer Privacy Act2 (CCPA) both impose sweeping requirements on businesses with the aim of increasing consumers’ privacy and control over how their personal data is used. For example, in John B.

Privacy 97