Remove tag cyber-attack
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

There are studies that show that men are more likely to apply for jobs that ask for 10 years of Kubernetes experience than bluster their way through the job interview. Women Studies show that unless they meet all the requirements, they're much less likely to apply. So, what, the company wanted one of the creators of Kubernetes?

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

There are studies that show that men are more likely to apply for jobs that ask for 10 years of Kubernetes experience than bluster their way through the job interview. Women Studies show that unless they meet all the requirements, they're much less likely to apply. So, what, the company wanted one of the creators of Kubernetes?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

And that's precisely what this 185th blog post tagging HIBP is - the noteworthy things of the years past, including a few things I've never discussed publicly before. And I never envisioned a time where dozens of national governments would be happy to talk about using the service. Or the UK's NCA to be feeding data in.

article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

With SQL queries, I can do anomaly detection and detect cyber attacks. With a database operating system, you’ll known in milliseconds if you’ve been attacked with malware. We can come up with a cyber deterrence concept, which would be determined on the basis of denying benefit. They'll eventually stop.