WATCH: How to Be Safe in the Age of Big Brother and Big Data | Kevin Mitnick
Qualys Presentation at RSA Conference 2017
Read More >Qualys Presentation at RSA Conference 2017
Read More >Most of us are aware that there are people trying to steal our personal information and identities, but are we aware of the easiest ways for these people to get it? No.
Read More »You know what I’m thankful for? Target. Where else are you going to find a 6 shelf, 80 inch bookcase for $35? Sure, it’s made of cheap wood and sways I bit if I bump into it, but hell… I gotta display my excessive collection of books some how. If I’m going to spend a ridiculous sum of money on acquiring and preserving a handwritten civil war memoir, I want people to appreciate it.
Read More »And what to do to stop being so used by cybercriminals
Read More »I was fortunate enough to meet the author, Kevin Mitnick, while attending RSA in February. I was given a signed copy of The Art of Invisibility, one of The State Security’s must-reads for infosec pros, so I made it a point to read the book.
Read More »When a credit bureau hired Kevin Mitnick’s company to test its security defenses, he went straight for the crown jewels. He decided he would try to get inside the bureau’s data center, physically, on his own two feet.
Read More »Cyber security is a people problem more than a technology problem. A single compromised employee, whether malicious or negligent, can render the best systems worthless.
Read More »Security can be a challenge. One unprotected port, one unchanged default password, or even one improperly configured item can leave businesses open to vulnerabilities and breaches. With so much to safeguard, it can be easy to miss the one small thing that could leave a crack in the wall. But hackers are persistent, and they’ll keep trying until they finally find the vulnerability you overlooked. “The adage is true that the security systems have to win every time, the attacker has to win once” says Dustin Dykes; a security consultant interviewed in the book by Kevin Mitnick.
Read More »Hackers may be classified into three, the black hat, gray hat, and the white hat hacker. However, society is more interested in the black hat, mainly because of their impact on the cyber world.
Read More »Event in Sandy
9575 S State St,Sandy
Wednesday 10 May 2017, 08:00 till Wednesday 10 May 2017, 17:00
Organized by : Red Sky Solutions
© Copyright 2004 - 2024 Mitnick Security Consulting LLC. All rights Reserved. | Privacy Policy