Head of Information Security at Directly, leading and managing a cross-functional annually audited InfoSec program, and IW CDR in the USNR. First and foremost, the hack starkly reminds us that all ...
The following content is from an older version of this website, and may not display correctly. My objective: break into a server room, disable the motion detectors, lock out the system administrator, ...
Technology is confusing but encryption and the mysterious world of hacking exist on a whole other level. It’s Matrix-like tech voodoo. Hackers are a 21 st-century boogeyman. They possess ...
Last week, the Washington Post provided new details about one of Russia’s opening cyberattacks in its war against Ukraine. Early accounts of the cyberattack on Viasat, a major satellite communications ...
Smart contract audits secure blockchain code but do not stop off-chain attacks. Hackers exploit weak points in APIs, wallets ...
I recently spent a day in my office again after more than a year away from it. Three things stood out to me – hydration, hiring and hacking. Each offers a lesson in post-pandemic risks, and how to ...
Hacking password reset questions is far easier than guessing the passwords themselves, and the Palin incident will surely start a trend Sarah Palin’s Yahoo e-mail account was hacked and at least some ...