Social engineering threatens IoT security issues
While the threat of IoT security issues is apparent, people and the processes they create are often more problematic.
Read More >While the threat of IoT security issues is apparent, people and the processes they create are often more problematic.
Read More >It's very difficult to come up with and remember unique passwords for every single login. Cyber security expert Kevin Mitnick — author of the book "The Art of Invisibility" — explains why you shouldn't even try to come up with your own passwords, and what you should do instead.
Read More »In his latest book, “The Art of Invisibility,” Kevin uses true-life stories to show exactly what is happening without your knowledge, teaching you online
Read More »The Editors at Cybersecurity Ventures read “The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age” by Adam Segal last year and featured it here. The groundbreaking book about cyberwarfare is as relevant today and when it was published — and recommended summer reading for anyone who hasn’t gotten to it yet.
Read More »I’ve written on this topic before, and despite the danger of sounding like a broken record, I will repeat myself: Cybersecurity is all about risk management. Many of you are likely working with your company’s chief information security officer (CISO) and security teams to help assess and control this cyberrisk. (At least I hope you are.) And one of the first things most security professionals recommend is taking an inventory of your IT assets. In fact, it’s embodied in the first Function of the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework:
Read More »The event, which ran in April, saw over 6,000 visitors across the two days at Manchester Central
Read More »While attending the RSA show in February, I met Kevin (@KevinMitnick) and obtained a copy of The Art of Invisibility, which I immediately read. Due to the great many references to Kevin’s past, I thought it would be informative and worthwhile to read Ghost in the Wires. It’s also listed on the Tripwire 10 must-read books for information security professionals.
Read More »As one of the world leaders in cyber hacking, Kevin Mitnick has a lot to say about user security.
Read More »The first edition of the PECB Insights Conference will be hosted at the “Palais des congrès de Montréal”, in Montreal, Canada, from the 29th to the 30th of June, 2017. With a variety of stimulating and interactive sessions, this edition begins with some interesting Pre-Conference Training courses, exclusively revealed on the 27th and 28th of June, 2017.
Read More »There are lots of different ways to send a message to a friend, but some offer more privacy than others. Kevin Mitnick, one of the world's most famous hackers and author of the book
Read More »© Copyright 2004 - 2024 Mitnick Security Consulting LLC. All rights Reserved. | Privacy Policy