Remove Mining Remove Security Remove Workshop
article thumbnail

Hack Yourself First Workshops in Australia, Denmark and Portugal (Virtually, of Course)

Troy Hunt

I want to talk about 3 upcoming events which Scott Helme and I are going to be running our Hack Yourself First workshop at starting with this one: NDC Security Australia, 26-27 March, AU$800 This is an extra special event that we've only just decided to run. The website is up and running and you can go and register right now.

Mining 102
article thumbnail

Weekly Update 175

Troy Hunt

I've had heaps of dramas in the past with recordings being lost and the first time I do a 3-person weekly update only 2 of them recorded (mine being the exception). Moving on, we've just wrapped up NDC Security in Oslo where Scott, Ari and I have all delivered sessions of one kind or another.

Mining 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Now for the big challenge - security. The "s" in IoT is for Security Ok, so the joke is a stupid oldie, but a hard truth lies within it: there have been some shocking instances of security lapses in IoT devices. Yeah, me either, because most of mine are probably like yours: the simplest electrical devices in the house.

IoT 142
article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

Regardless of how familiar you are with Information Security, you’ve probably come across the term ‘malware’ countless times. Related: Companies must bear a broad security burden. Security warnings keep popping up, urging you to take immediate action or install a particular security product. Warning signs.

article thumbnail

International Women’s Day 2022: How to Forge an Inclusive Work Culture

Thales Cloud Protection & Licensing

Thales asked six women in the cybersecurity industry to provide their opinions on how business can build an inclusive work culture and what this means for security leaders around the world. Winnie Wong , APAC Regional & Channel Marketing for Data Security products at Thales. “An Let’s hear what they have to say.

article thumbnail

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

My congressional testimony in the US was a very public example of that, less so are the dozens of conversations I've had in all sorts of settings including during conferences, workshops and over coffees and beers. The way we're doing this is by using the commercial model within HIBP and scoping it to a limited set of whitelisted domains.

article thumbnail

Fixing Data Breaches Part 4: Bug Bounties

Troy Hunt

Bug bounties have a really interesting way of changing the economics of security flaws and reversing the outcome from one where companies and customers lose, to promoting one where everyone wins. When I run workshops , at the end of the second day I like to talk about automating security. Let's explore that further.