Remove Examples Remove Mining Remove Security Remove Workshop
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Now for the big challenge - security. The "s" in IoT is for Security Ok, so the joke is a stupid oldie, but a hard truth lies within it: there have been some shocking instances of security lapses in IoT devices. But there are also some quick wins, especially in the realm of "using your common sense". Let's dive into it.

IoT 143
article thumbnail

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

My congressional testimony in the US was a very public example of that, less so are the dozens of conversations I've had in all sorts of settings including during conferences, workshops and over coffees and beers. For example, the UK government can query any.gov.uk domain on demand and the Aus government can query any.gov.au

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

Likewise, the ICRM exam preparation workshop—which I’d highly recommend to prospective candidates—gave me a bead on what subject areas to target, especially for the management part, which can come across at first glance as a pan-MBA undertaking. BYOD can introduce threats to the security of your organization’s information.”.

article thumbnail

International Women’s Day 2022: How to Forge an Inclusive Work Culture

Thales Cloud Protection & Licensing

Thales asked six women in the cybersecurity industry to provide their opinions on how business can build an inclusive work culture and what this means for security leaders around the world. For example, is it in a meeting when only the most dominant, loudest voices are heard? Let’s hear what they have to say.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role might the security industry have in identifying or even stopping it? There are literally dozens of other examples. Welcome to the hacker mind, in original podcast from for all security. What role does technology play in facilitating intimate partner abuse? So here's the thing, SpyPhone is not an isolated incident.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Anyone who has anyone in the information security community is usually melting under the hot Nevada sun. And by de I'm an analyst at Javelin strategy and research where I do security risk and fraud for the financial services industry. I write a monthly security column for Windows Secrets and I do a couple other things on the side.

article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

In fact, those guys are all pretty good examples of the ability to build amazing things from the ground up and I'm sure that many of you reading this have sat down and started building something with the same enthusiasm as, say, Zuckerberg did with Facebook in 2004. Just over 2 years ago, my wife (Kylie) had spinal surgery.

Education 111