<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>In The News</title>
    <link>https://www.mitnicksecurity.com/in-the-news</link>
    <description />
    <language>en</language>
    <pubDate>Mon, 12 Dec 2022 22:46:27 GMT</pubDate>
    <dc:date>2022-12-12T22:46:27Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Advice from Kevin Mitnick Featured in the Wall Street Journal Op-Ed</title>
      <link>https://www.mitnicksecurity.com/in-the-news/advice-from-kevin-mitnick-featured-in-the-wall-street-journal-op-ed</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/advice-from-kevin-mitnick-featured-in-the-wall-street-journal-op-ed" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Screen%20Shot%202020-08-14%20at%203.48.55%20PM.png" alt="Kevin Mitnick illustration WSJ" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Kevin Mitnick was interviewed by Mr. Maniloff who is an attorney at White and Williams LLP in Philadelphia and an adjunct professor at Temple University’s Beasley School of Law.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/advice-from-kevin-mitnick-featured-in-the-wall-street-journal-op-ed" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Screen%20Shot%202020-08-14%20at%203.48.55%20PM.png" alt="Kevin Mitnick illustration WSJ" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Kevin Mitnick was interviewed by Mr. Maniloff who is an attorney at White and Williams LLP in Philadelphia and an adjunct professor at Temple University’s Beasley School of Law.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fin-the-news%2Fadvice-from-kevin-mitnick-featured-in-the-wall-street-journal-op-ed&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fin-the-news&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>KnowBe4</category>
      <category>cybercrime</category>
      <category>Kevin Mtinick</category>
      <category>WSJ</category>
      <category>Op-Ed</category>
      <pubDate>Fri, 16 Aug 2019 13:48:00 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/in-the-news/advice-from-kevin-mitnick-featured-in-the-wall-street-journal-op-ed</guid>
      <dc:date>2019-08-16T13:48:00Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>12 Ways to Defeat Two-Factor Authentication</title>
      <link>https://www.mitnicksecurity.com/in-the-news/12-ways-to-defeat-two-factor-authentication</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/12-ways-to-defeat-two-factor-authentication" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/kevin-ku-w7ZyuGYNpRQ-unsplash.jpg" alt="12 Ways to Defeat Two-Factor Authentication" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/12-ways-to-defeat-two-factor-authentication" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/kevin-ku-w7ZyuGYNpRQ-unsplash.jpg" alt="12 Ways to Defeat Two-Factor Authentication" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fin-the-news%2F12-ways-to-defeat-two-factor-authentication&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fin-the-news&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>tw-factor authentication - Roger A. Grimes</category>
      <category>Chief Hacking Officer</category>
      <category>Data-Driven Defense Evangelist</category>
      <category>keynote speaker</category>
      <category>security awareness training</category>
      <category>KnowBe4</category>
      <category>simulated phishing platform</category>
      <category>2FA solution</category>
      <category>Kevin Mitnick</category>
      <pubDate>Wed, 12 Dec 2018 00:00:00 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/in-the-news/12-ways-to-defeat-two-factor-authentication</guid>
      <dc:date>2018-12-12T00:00:00Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>We Need to Talk About NIST’s Dropped Password Management Recommendations</title>
      <link>https://www.mitnicksecurity.com/in-the-news/we-need-to-talk-about-nists-dropped-password-management-recommendations</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/we-need-to-talk-about-nists-dropped-password-management-recommendations" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/simon-abrams-k_T9Zj3SE8k-unsplash.jpg" alt="We Need to Talk About NIST’s Dropped Password Management Recommendations" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Passwords and their protection are among the most fundamental, essential aspects of enterprise data security. They also make up the bane of most users’ relationships with their enterprise devices, resources and assets. It seems no matter how stringent or lax your password policy is, the directive will be met with dissension from a significant portion of your staff. It’s frustrating for everyone — the IT department, C-suite and employees.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/we-need-to-talk-about-nists-dropped-password-management-recommendations" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/simon-abrams-k_T9Zj3SE8k-unsplash.jpg" alt="We Need to Talk About NIST’s Dropped Password Management Recommendations" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Passwords and their protection are among the most fundamental, essential aspects of enterprise data security. They also make up the bane of most users’ relationships with their enterprise devices, resources and assets. It seems no matter how stringent or lax your password policy is, the directive will be met with dissension from a significant portion of your staff. It’s frustrating for everyone — the IT department, C-suite and employees.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fin-the-news%2Fwe-need-to-talk-about-nists-dropped-password-management-recommendations&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fin-the-news&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>2FA</category>
      <category>Biometric Security</category>
      <category>Two-Factor Authentication</category>
      <category>Fraud Prevention</category>
      <category>keynote speaker</category>
      <category>Password</category>
      <category>Password Management</category>
      <category>Passwords</category>
      <category>Security Awareness</category>
      <category>Multifactor Authentication (MFA</category>
      <category>Password Reuse</category>
      <category>Kevin Mitnick</category>
      <pubDate>Mon, 26 Nov 2018 00:00:00 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/in-the-news/we-need-to-talk-about-nists-dropped-password-management-recommendations</guid>
      <dc:date>2018-11-26T00:00:00Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>KnowBe4 Positioned as Leader in the Gartner Magic Quadrant for Second Consecutive Year</title>
      <link>https://www.mitnicksecurity.com/in-the-news/knowbe4-positioned-as-leader-in-the-gartner-magic-quadrant-for-second-consecutive-year</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/knowbe4-positioned-as-leader-in-the-gartner-magic-quadrant-for-second-consecutive-year" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/cybersecuritykeynoteworkshop.jpg" alt="KnowBe4 Positioned as Leader in the Gartner Magic Quadrant for Second Consecutive Year" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;KnowBe4 recognized for security awareness computer-based training; positioned furthest in vision&lt;/p&gt; 
&lt;p&gt;(Ed. note: Kevin Mitnick is the Chief Hacking Officer of KnowBe4 and their flagship product is Kevin Mitnick's Security Awareness Training)&lt;/p&gt; 
&lt;p&gt;KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, today announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the Magic Quadrant for Security Awareness Computer-Based Training for the second year in a row.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/knowbe4-positioned-as-leader-in-the-gartner-magic-quadrant-for-second-consecutive-year" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/cybersecuritykeynoteworkshop.jpg" alt="KnowBe4 Positioned as Leader in the Gartner Magic Quadrant for Second Consecutive Year" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;KnowBe4 recognized for security awareness computer-based training; positioned furthest in vision&lt;/p&gt; 
&lt;p&gt;(Ed. note: Kevin Mitnick is the Chief Hacking Officer of KnowBe4 and their flagship product is Kevin Mitnick's Security Awareness Training)&lt;/p&gt; 
&lt;p&gt;KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, today announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the Magic Quadrant for Security Awareness Computer-Based Training for the second year in a row.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fin-the-news%2Fknowbe4-positioned-as-leader-in-the-gartner-magic-quadrant-for-second-consecutive-year&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fin-the-news&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Stu Sjouwerman</category>
      <category>Virtual Risk Officer</category>
      <category>Phish-prone Percentage</category>
      <category>Chief Hacking Officer</category>
      <category>keynote speaker</category>
      <category>security awareness training</category>
      <category>security education</category>
      <category>KnowBe4</category>
      <category>simulated phishing platform</category>
      <category>Advanced Reporting</category>
      <category>Gartner Magic Quadrant</category>
      <category>Kevin Mitnick</category>
      <pubDate>Mon, 19 Nov 2018 00:00:00 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/in-the-news/knowbe4-positioned-as-leader-in-the-gartner-magic-quadrant-for-second-consecutive-year</guid>
      <dc:date>2018-11-19T00:00:00Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>Famous Hacker Kevin Mitnick Kicks-Off Infosecurity North America 2018</title>
      <link>https://www.mitnicksecurity.com/in-the-news/famous-hacker-kevin-mitnick-kicks-off-infosecurity-north-america-2018</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/famous-hacker-kevin-mitnick-kicks-off-infosecurity-north-america-2018" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/freestocks-I_pOqP6kCOI-unsplash.jpg" alt="Famous Hacker Kevin Mitnick Kicks-Off Infosecurity North America 2018" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Cyber security pros and the world's most famous hacker Kevin Mitnick kicked-off the Infosecurity North America Expo and Conference Opening Day Wednesday at New York's Jacob Javits Convention Center. Spearheaded by the Infosecurity Group, the global knowledge hub for the information security community, Infosecurity North America is one of the foremost events on the cybersecurity industry calendar.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/famous-hacker-kevin-mitnick-kicks-off-infosecurity-north-america-2018" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/freestocks-I_pOqP6kCOI-unsplash.jpg" alt="Famous Hacker Kevin Mitnick Kicks-Off Infosecurity North America 2018" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Cyber security pros and the world's most famous hacker Kevin Mitnick kicked-off the Infosecurity North America Expo and Conference Opening Day Wednesday at New York's Jacob Javits Convention Center. Spearheaded by the Infosecurity Group, the global knowledge hub for the information security community, Infosecurity North America is one of the foremost events on the cybersecurity industry calendar.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fin-the-news%2Ffamous-hacker-kevin-mitnick-kicks-off-infosecurity-north-america-2018&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fin-the-news&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>hackathon</category>
      <category>Infosecurity North America Expo and Conference</category>
      <category>Jacob Javits Convention Center</category>
      <category>keynote speaker</category>
      <category>nuclear secrets</category>
      <category>live hacking demo</category>
      <category>robots</category>
      <category>Wall Street Journal</category>
      <category>cybersecurity pros</category>
      <category>New York</category>
      <category>Kevin Mitnick</category>
      <pubDate>Thu, 15 Nov 2018 00:00:00 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/in-the-news/famous-hacker-kevin-mitnick-kicks-off-infosecurity-north-america-2018</guid>
      <dc:date>2018-11-15T00:00:00Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>SEE LIVE: Meet The World’s Most Famous Hacker: Kevin Mitnick</title>
      <link>https://www.mitnicksecurity.com/in-the-news/see-live-meet-the-worlds-most-famous-hacker-kevin-mitnick</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/see-live-meet-the-worlds-most-famous-hacker-kevin-mitnick" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/thomas-lefebvre-gp8BLyaTaA0-unsplash.jpg" alt="SEE LIVE: Meet The World’s Most Famous Hacker: Kevin Mitnick" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Kevin Mitnick&amp;nbsp;is perhaps best known as the hacker who made it onto the FBI’s Most Wanted List for breaking into the computer systems of multiple government agencies and over 40 major corporations.&lt;/p&gt; 
&lt;p&gt;Mitnick was a fugitive for four years, and after getting caught was put on trial and sentenced to five years in a federal prison, including a year in solitary confinement.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/see-live-meet-the-worlds-most-famous-hacker-kevin-mitnick" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/thomas-lefebvre-gp8BLyaTaA0-unsplash.jpg" alt="SEE LIVE: Meet The World’s Most Famous Hacker: Kevin Mitnick" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Kevin Mitnick&amp;nbsp;is perhaps best known as the hacker who made it onto the FBI’s Most Wanted List for breaking into the computer systems of multiple government agencies and over 40 major corporations.&lt;/p&gt; 
&lt;p&gt;Mitnick was a fugitive for four years, and after getting caught was put on trial and sentenced to five years in a federal prison, including a year in solitary confinement.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fin-the-news%2Fsee-live-meet-the-worlds-most-famous-hacker-kevin-mitnick&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fin-the-news&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Social Engineering</category>
      <category>solitary confinement</category>
      <category>cyber awareness</category>
      <category>England</category>
      <category>cybersecurity expert</category>
      <category>FBI</category>
      <category>Ken Munro</category>
      <category>keynote speaker</category>
      <category>London</category>
      <category>Michael Mainelli</category>
      <category>risk management</category>
      <category>Lotem Guy</category>
      <category>white hat hacker</category>
      <category>Cyber Incursion</category>
      <category>Gary Brailsford-Hart</category>
      <category>Josh Mitchell</category>
      <category>Kevin Mitnick</category>
      <pubDate>Wed, 14 Nov 2018 00:00:00 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/in-the-news/see-live-meet-the-worlds-most-famous-hacker-kevin-mitnick</guid>
      <dc:date>2018-11-14T00:00:00Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>Mitnick Talks Social Engineering and Attack Tactics</title>
      <link>https://www.mitnicksecurity.com/in-the-news/mitnick-talks-social-engineering-and-attack-tactics</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/mitnick-talks-social-engineering-and-attack-tactics" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/campaign-creators-qCi_MzVODoU-unsplash.jpg" alt="Mitnick Talks Social Engineering and Attack Tactics" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Breaches get worse and attacks keep happening, as threat actors have all of the capability thanks to user’s habits.&lt;/p&gt; 
&lt;p&gt;Speaking at Infosecurity North America in New York City, author, speaker and chief hacking officer of KnowBe4 Kevin Mitnick said that threat actors are able to collect information on their victims all too easily, and when evaluating a company it is also straight-forward to determine suppliers, customers, partners, vendors and employees to enable a social engineering exercise.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/mitnick-talks-social-engineering-and-attack-tactics" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/campaign-creators-qCi_MzVODoU-unsplash.jpg" alt="Mitnick Talks Social Engineering and Attack Tactics" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Breaches get worse and attacks keep happening, as threat actors have all of the capability thanks to user’s habits.&lt;/p&gt; 
&lt;p&gt;Speaking at Infosecurity North America in New York City, author, speaker and chief hacking officer of KnowBe4 Kevin Mitnick said that threat actors are able to collect information on their victims all too easily, and when evaluating a company it is also straight-forward to determine suppliers, customers, partners, vendors and employees to enable a social engineering exercise.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fin-the-news%2Fmitnick-talks-social-engineering-and-attack-tactics&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fin-the-news&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Social Engineering</category>
      <category>U2F protocol tokens</category>
      <category>data theft</category>
      <category>hacker attacks</category>
      <category>Infosecurity North America</category>
      <category>keynote speaker</category>
      <category>KnowBe4</category>
      <category>two-factor identification</category>
      <category>authentication</category>
      <category>DNS propagation</category>
      <category>New York City</category>
      <category>Kevin Mitnick</category>
      <pubDate>Wed, 14 Nov 2018 00:00:00 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/in-the-news/mitnick-talks-social-engineering-and-attack-tactics</guid>
      <dc:date>2018-11-14T00:00:00Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>SEE LIVE: Cyber Incursion – Protecting Your Assets</title>
      <link>https://www.mitnicksecurity.com/in-the-news/see-live-cyber-incursion-protecting-your-assets</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/see-live-cyber-incursion-protecting-your-assets" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/bethany-legg-75nbwHfDsnY-unsplash.jpg" alt="SEE LIVE: Cyber Incursion – Protecting Your Assets" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Kevin Mitnick is perhaps best known as the hacker who made it onto the FBI’s Most Wanted List for breaking into the computer systems of multiple government agencies and over 40 major corporations. Mitnick was a fugitive for four years, and after getting caught was put on trial and sentenced to five years in a federal prison, including a year in solitary confinement.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/see-live-cyber-incursion-protecting-your-assets" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/bethany-legg-75nbwHfDsnY-unsplash.jpg" alt="SEE LIVE: Cyber Incursion – Protecting Your Assets" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Kevin Mitnick is perhaps best known as the hacker who made it onto the FBI’s Most Wanted List for breaking into the computer systems of multiple government agencies and over 40 major corporations. Mitnick was a fugitive for four years, and after getting caught was put on trial and sentenced to five years in a federal prison, including a year in solitary confinement.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fin-the-news%2Fsee-live-cyber-incursion-protecting-your-assets&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fin-the-news&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>The Art of Deception</category>
      <category>The Art of Invisibility</category>
      <category>The Art of Intrusion</category>
      <category>Chief Hacking Officer</category>
      <category>cyber security</category>
      <category>Jon Cosson</category>
      <category>Ken Munro</category>
      <category>keynote speaker</category>
      <category>London England</category>
      <category>Risk Strategies</category>
      <category>Josh MitchellLotem Guy</category>
      <category>KnowBe4</category>
      <category>Professor Michael Mainelli</category>
      <category>Cyber Incursion</category>
      <category>Gary Brailsford-Hart</category>
      <category>Ghost in the Wires</category>
      <category>Kevin Mitnick</category>
      <pubDate>Wed, 14 Nov 2018 00:00:00 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/in-the-news/see-live-cyber-incursion-protecting-your-assets</guid>
      <dc:date>2018-11-14T00:00:00Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>NEW CARTOON: How Kevin Mitnick Stole the Source Code for the Best Cell Phone of 1992</title>
      <link>https://www.mitnicksecurity.com/in-the-news/new-cartoon-how-kevin-mitnick-stole-the-source-code-for-the-best-cell-phone-of-1992</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/new-cartoon-how-kevin-mitnick-stole-the-source-code-for-the-best-cell-phone-of-1992" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/christina-wocintechchat-com-glRqyWJgUeY-unsplash.jpg" alt="NEW CARTOON: How Kevin Mitnick Stole the Source Code for the Best Cell Phone of 1992" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;While on the run from the feds, Kevin Mitnick stole the source code of the Motorola MicroTAC Ultralite, the most advanced cellphone at the time, with a few phone calls.&lt;/p&gt; 
&lt;p&gt;n 1992, Kevin Mitnick was on the run from the cops, one of the most wanted men in the United States, and certainly the most wanted hacker. He was living in Denver under a pseudonym, and was very worried about government surveillance.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/new-cartoon-how-kevin-mitnick-stole-the-source-code-for-the-best-cell-phone-of-1992" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/christina-wocintechchat-com-glRqyWJgUeY-unsplash.jpg" alt="NEW CARTOON: How Kevin Mitnick Stole the Source Code for the Best Cell Phone of 1992" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;While on the run from the feds, Kevin Mitnick stole the source code of the Motorola MicroTAC Ultralite, the most advanced cellphone at the time, with a few phone calls.&lt;/p&gt; 
&lt;p&gt;n 1992, Kevin Mitnick was on the run from the cops, one of the most wanted men in the United States, and certainly the most wanted hacker. He was living in Denver under a pseudonym, and was very worried about government surveillance.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fin-the-news%2Fnew-cartoon-how-kevin-mitnick-stole-the-source-code-for-the-best-cell-phone-of-1992&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fin-the-news&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Social Engineering</category>
      <category>GMIHH</category>
      <category>government surveillance</category>
      <category>TAR</category>
      <category>Denver</category>
      <category>GZiP</category>
      <category>hackers</category>
      <category>hacking</category>
      <category>keynote speaker</category>
      <category>INFOSEC</category>
      <category>LINUX</category>
      <category>source code</category>
      <category>cell phone</category>
      <category>Hacking History</category>
      <category>identifying data</category>
      <category>information security</category>
      <category>Kevin Mitnick</category>
      <category>Motorola MicroTAC Ultralite</category>
      <pubDate>Wed, 14 Nov 2018 00:00:00 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/in-the-news/new-cartoon-how-kevin-mitnick-stole-the-source-code-for-the-best-cell-phone-of-1992</guid>
      <dc:date>2018-11-14T00:00:00Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>How Do You Get Students to Think Like Criminals?</title>
      <link>https://www.mitnicksecurity.com/in-the-news/how-do-you-get-students-to-think-like-criminals</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/how-do-you-get-students-to-think-like-criminals" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/annie-spratt-QckxruozjRg-unsplash.jpg" alt="How Do You Get Students to Think Like Criminals?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The skills needed for cybersecurity jobs aren’t easy to learn in the classroom.&lt;/p&gt; 
&lt;p&gt;Between September 2017 and August 2018, employers in the United States posted 313,735 job openings for cybersecurity professionals. Filling those jobs would mean increasing the country’s current cybersecurity work force of 715,000 people by more than 40 percent, according to data presented at the National Initiative for Cybersecurity Education Conference this month. With the number of unfilled cybersecurity jobs worldwide projected to multiply into the millions in the next three years, it’s no surprise that governments, companies and schools are racing to pour more resources into cybersecurity training and education programs.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/in-the-news/how-do-you-get-students-to-think-like-criminals" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Images/Events/In%20The%20News/annie-spratt-QckxruozjRg-unsplash.jpg" alt="How Do You Get Students to Think Like Criminals?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The skills needed for cybersecurity jobs aren’t easy to learn in the classroom.&lt;/p&gt; 
&lt;p&gt;Between September 2017 and August 2018, employers in the United States posted 313,735 job openings for cybersecurity professionals. Filling those jobs would mean increasing the country’s current cybersecurity work force of 715,000 people by more than 40 percent, according to data presented at the National Initiative for Cybersecurity Education Conference this month. With the number of unfilled cybersecurity jobs worldwide projected to multiply into the millions in the next three years, it’s no surprise that governments, companies and schools are racing to pour more resources into cybersecurity training and education programs.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fin-the-news%2Fhow-do-you-get-students-to-think-like-criminals&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fin-the-news&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>penetration-testing firms</category>
      <category>Rochester Institute of Technology</category>
      <category>Bruce Schneier</category>
      <category>cryptography</category>
      <category>cybersecurity job</category>
      <category>Equifax breach</category>
      <category>hacking</category>
      <category>increased cybersecurity employment</category>
      <category>keynote speaker</category>
      <category>red-teaming</category>
      <category>security consultant</category>
      <category>security mind-set</category>
      <category>Kevin Mitnick</category>
      <pubDate>Wed, 14 Nov 2018 00:00:00 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/in-the-news/how-do-you-get-students-to-think-like-criminals</guid>
      <dc:date>2018-11-14T00:00:00Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
  </channel>
</rss>
