article thumbnail

NEW TECH: Circadence deploys ‘gamification’ training to shrink cybersecurity skills gap

The Last Watchdog

Related: The need for diversity in cybersecurity personnel One of the top innovators in the training space is Circadence ®. The Boulder, CO-based company got its start in the mid-1990s as a pioneer of massive multi-player video games. The way people are trained in cybersecurity right now is the opposite of gamification.

article thumbnail

Iran-linked APT35 accidentally exposed 40 GB associated with their operations

Security Affairs

Iran-linked APT35 group accidentally exposed one of its servers, leaving online roughly 40 GB of videos and other files associated with its operations. The experts found several files on the server, roughly five hours of training videos recorded by the APT group. Some of the videos were showing how to exfiltrate data (i.e.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kevin Mitnick, Hacker Turned Cybersecurity Leader, Dies at 59

eSecurity Planet

He helped design KnowBe4’s training based on his social engineering tactics, and he became a partial owner of KnowBe4 in November 2011. Mitnick often represented the company at conferences and discussed his experience in KnowBe4 training videos. military systems and launch nuclear missiles through mere whistling.

article thumbnail

Episode 256: Recursive Pollution? Data Feudalism? Gary McGraw On LLM Insecurity

The Security Ledger

Related Stories BitCoins To Bombs: North Korea Funds Military With Billions In Stolen Cryptocurrency China Calls Out U.S. Video Podcast ] | [ MP3 ] | [ Transcript ] Four years ago, I sat down with Gary McGraw in the Security Ledger studio to talk about a report released by his new project, The Berryville Institute of Machine learning.

article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

Thanks to the sudden rise in use of Zoom and other video conferencing systems by an expanding work-from-home workforce, their logons are begin targeted by threat actors; underground forums today are bristling with databases holding hundreds of thousands of recycled Zoom logon credentials.

Security 309
article thumbnail

National Nurses Day and World Red Cross Day with the Home Nursing Series

Unwritten Record

The Red Cross experimented with televised lessons to accompany the Red Cross Home Nursing Textbook in an effort to train home caretakers on the treatment of the sick and injured. Still taken from ANRC-ANRC-63020. Today we are watching the Home Nursing Series.

article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

IoT devices help remotely control our household appliances, power plants, smart buildings, factories, airports, shipyards, trucks, trains and military. Sherman “Sometimes we don’t even realize how many of our devices today have audio and video recording capabilities,” Sherman says. And we’re just getting started.

IoT 279