Remove 12
Remove 2013 Remove Exercises Remove Military Remove Security
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

Vamosi: One sunny morning in 2013. SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. Operational Security is typically a military process. In 2013, we only knew that someone calling themselves Dread Pirate Roberts was running the site. Not so easy.

Privacy 52
article thumbnail

A Flurry of Recent Cybersecurity Activity from the Trump Administration

Data Matters

For example, in 2013, the Federal Bureau of Investigation (FBI) partnered with Microsoft to disrupt more than 1,400 Citadel botnets. Products should be secured during all stages of the lifecycle ,” as it is too easy to assemble botnets when devices lack the ability for effective patching or “remain in service after vendor support ends.”.