WATCH - BOOK REVIEW: The Art of Intrusion | Kevin Mitnick
Video: Book Review by Suki Zheng
Kevin Mitnick, in The Art of Intrusion, tells the intriguing and slightly frightening accounts of numerous exploits of our security, or more specifically our lack thereof, by hackers.
The Ethical Hacker: Are You Accounting for One of Your Largest Cybersecurity Risks?
I’ve written on this topic before, and despite the danger of sounding like a broken record, I will repeat myself: Cybersecurity is all about risk management. Many of you are likely working with your company’s chief information security officer (CISO) and security teams to help assess and control this cyberrisk. (At least I hope you are.) And one of the first things most security professionals recommend is taking an inventory of your IT assets. In fact, it’s embodied in the first Function of the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework:
Hackers can steal your info in three easy steps when you use public Wi-Fi
Are you always on the hunt for open public hotspots to save on data costs? Or perhaps you are on the road and you need an internet connection to quickly check on remote documents on your work laptop.