Remove tag internet-of-things
article thumbnail

Episode 187: Filtergate is DRM for Water

The Security Ledger

» Related Stories Episode 186: Certifying Your Smart Home Security with GE Appliances and UL Spotlight Podcast: Two Decades On TCG Tackles Trustworthiness For The Internet of Things Spotlight Podcast: As Attacks Mount, ERP Security Still Lags. . » In our second segment: information security has a scale problem.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. And as I watched, it was clear to me that someone there knew how things worked, this unassuming guy across the table who was professional, cool and winning hand after hand. There are the elite CTF players.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. And as I watched, it was clear to me that someone there knew how things worked, this unassuming guy across the table who was professional, cool and winning hand after hand. There are the elite CTF players.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. And as I watched, it was clear to me that someone there knew how things worked, this unassuming guy across the table who was professional, cool and winning hand after hand. There are the elite CTF players.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Vamosi: But as someone who wrote a book questioning the security of our mass produced IoT devices, I wonder why no one bothered to test and certify these devices before they were installed? And on the other hand, we're saying security, that's a secondary concern. Like any true hacker, this isn’t his day job; this is his passion.