Robert Hansen from WhiteHat Security (@rsnake) recently interviewed a BlackHat hacker ("Adam") to discuss how they got into hacking in the first place, what sort of organisations they target and why, etc.
- ROBERT HANSEN
- Interviews
- Posted On
Robert Hansen from WhiteHat Security (@rsnake) recently interviewed a BlackHat hacker ("Adam") to discuss how they got into hacking in the first place, what sort of organisations they target and why, etc.
Vigilance can report that Chris Phillips, former Head of National Counter Terrorism Security Office at CPNI (part of MI5) and John Steed, Chief of Maritime Security and Counter Piracy of United Nations Political Office for Somalia will be joining the Oil & Gas Security 2013 Summit. Mr Phillips will provide attendees with an exclusive insight on tried and tested methods to reduce insider threats to an organisation or company along with practical guidelines on successfully building a security culture within a company. Having been the head of the National Counter Terrorism Security Office until recently and with thirty years’ experience in both major public order and community based policing, his presentation will bring a unique and highly insightful perspective to the meeting providing delegates with real food for thought when forming security strategies.
LONDON, UK: PhishMe, the leading enterprise provider of immersive phishing awareness training, has now trained over 4 million unique users at 200 different organizations. PhishMe’s customer base includes a number of the Fortune 500, and leaders in the financial, energy, insurance, healthcare, and government sectors. This milestone demonstrates how enterprises globally are working to counter the most common attack methodology used to compromise networks through managing employee behavior.
The success of huge online companies, like Google, Facebook and Yahoo, in using Big Data techniques to manage very large volumes of data – think terabytes and petabytes of information – has meant that many large organisations worldwide are working to develop and deploy Big Data facilities alongside their established business intelligence infrastructure.
This phenomenon is still the new kid on the block and, as a result, few standards are currently in place to ensure that these new systems are successfully integrated into existing policy frameworks that guarantee governance, compliance and security. Data security, for example has the potential to stop many of these developments if not properly addressed.
This article shows comprehensive solutions to ensure the security of sensitive information in Big Data environments, without impairing their operational flexibility or performance.
To expose official corruption in Nigeria, re-orientate the psyche of Nigerians and usher in the Nigerian renaissance
Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.
Vigilance is the brain child of a group of veteran journalists and international scholars who have worked in the mainstream media and distinguished themselves nationally and internationally before veering into security practice.
We have 811 guests and no members online