Social engineering threatens IoT security issues
While the threat of IoT security issues is apparent, people and the processes they create are often more problematic.
Read More >While the threat of IoT security issues is apparent, people and the processes they create are often more problematic.
Read More >Once arrested by the FBI, Mitnick tells us how to keep information private online.
Read More »It's very difficult to come up with and remember unique passwords for every single login. Cyber security expert Kevin Mitnick — author of the book "The Art of Invisibility" — explains why you shouldn't even try to come up with your own passwords, and what you should do instead.
Read More »Fault Injection is a podcast from Synopsys that digs into software quality and security issues. In this episode, host Robert Vamosi, CISSP and Security Strategist at Synopsys, interviews Kevin Mitnick about how to stay secure at security conferences. Kevin draws on tips from his latest book, The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data.
Read More »In his latest book, “The Art of Invisibility,” Kevin uses true-life stories to show exactly what is happening without your knowledge, teaching you online
Read More »Every year, thousands of IT pros and tech marketers descend upon Austin, Texas to talk about tech at our IT conference, SpiceWorld (where everything IT connects!). And if you attend, you'll experience not only awesome parties and networking with your peers over a beer or three, you'll also have the opportunity to see great presentations put on by IT professionals in the know.
Read More »The Editors at Cybersecurity Ventures read “The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age” by Adam Segal last year and featured it here. The groundbreaking book about cyberwarfare is as relevant today and when it was published — and recommended summer reading for anyone who hasn’t gotten to it yet.
Read More »The word “hacker” conjures many mental images in the marketplace, and very, very few of them are good. Seriously, it’s pretty much Snowden and Angelina Jolie with a pixie cut, and plenty of people don’t like Snowden.
Read More »I’ve written on this topic before, and despite the danger of sounding like a broken record, I will repeat myself: Cybersecurity is all about risk management. Many of you are likely working with your company’s chief information security officer (CISO) and security teams to help assess and control this cyberrisk. (At least I hope you are.) And one of the first things most security professionals recommend is taking an inventory of your IT assets. In fact, it’s embodied in the first Function of the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework:
Read More »Are you part of the 87 percent of Americans that use public Wi-Fi? If your answer is yes then you could be in the crosshairs of a hacker. That's right, free Wi-Fi comes with a price and it’s your information. Jared Cotter is talking with security expert Kevin Mitnick to find out where the three spots are where you’re more likely to be hacked, and how to better protect yourself
Read More »© Copyright 2004 - 2024 Mitnick Security Consulting LLC. All rights Reserved. | Privacy Policy