Remove 10
Remove 2014 Remove Examples Remove Government Remove How To Remove Tools
article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

So here it is - 10 Personal Financial Lessons for Technology Professionals. I don't just mean at the crazy rich end of the scale (4 of the world's top 10 richest people did it in tech - Bezos, Gates, Zuckerberg and Ellison), but at all levels of our profession. Intro: This Industry Rocks!

Education 111
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. Here, Motherboard talks about personal data being sold for less than $10 a pop in a case that sounds eerily similar to the previously mentioned Medicare one. billion locals' data.

Security 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Here, Part 3 discusses how to manage the various DT risks. This discussion includes methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. Srivastav 2014, p 18). Risk Management and DT Experience. Uncertainty and risk are not the same.

article thumbnail

Game Theory: Why System Security Is Like Poker, Not Chess

ForAllSecure

We need to think about how it’s different, build models, and see how those models play out. For example, an exploit is just bits on a wire and can be copied if your opponent happens to log the attack. government has a responsibility to protect the nation, which (quite rationally) entails both cyber offense and defense.

article thumbnail

Game Theory: Why System Security Is Like Poker, Not Chess

ForAllSecure

We need to think about how it’s different, build models, and see how those models play out. For example, an exploit is just bits on a wire and can be copied if your opponent happens to log the attack. government has a responsibility to protect the nation, which (quite rationally) entails both cyber offense and defense.

article thumbnail

GAME THEORY: WHY SYSTEM SECURITY IS LIKE POKER, NOT CHESS

ForAllSecure

We need to think about how it’s different, build models, and see how those models play out. For example, an exploit is just bits on a wire and can be copied if your opponent happens to log the attack. government has a responsibility to protect the nation, which (quite rationally) entails both cyber offense and defense.

article thumbnail

Can Enterprises execute a GRC Movement?

Security Affairs

Any business is run with governance framework and various industry regulatory compliance. Any issue in corporate governance or compliance leads to increase in risk…Hence a Platform is required whose purpose is to reduce the risk in the organization. Policies not only help govern a nation but also govern an enterprise.