US to Launch Third Iteration of ‘Hack the Pentagon’ Bug Bounty Program
Cybersecurity researchers will try and find vulnerabilities in the government’s FRCS network
Cyber News, Cyber Threat TrendsCybersecurity researchers will try and find vulnerabilities in the government’s FRCS network
Cyber News, Cyber Threat TrendsCybersecurity researchers will try and find vulnerabilities in the government’s FRCS network
Cyber News, Cyber Threat TrendsCybersecurity researchers will try and find vulnerabilities in the government’s FRCS network
Cyber News, Cyber Threat TrendsCybersecurity researchers will try and find vulnerabilities in the government’s FRCS network
Cyber News, Cyber Threat TrendsCybersecurity researchers will try and find vulnerabilities in the government’s FRCS network
Cyber News, Cyber Threat TrendsCybersecurity researchers will try and find vulnerabilities in the government’s FRCS network
Cyber News, Cyber Threat TrendsThis is a current list of where and when I am scheduled to speak: I’m speaking at Capricon, a four-day science fiction convention in Chicago. My talk is on “The Coming AI Hackers” and will be held Friday, February 3 at 1:00 PM. The list is maintained on this page.
Cyber News, Cyber Threat TrendsACM.133 Limiting Pass Role permissions using AWS IAM policies This is a continuation of my series on Automating Cybersecurity Metrics. In the last post I wrote about AWS IAM Permission Boundaries. AWS IAM Permission Boundaries In this post we’ll consider permission boundaries with the IAM Pass Role permission. The IAM Pass Role permission How does a […]
Cyber News, Cyber Threat TrendsDefining a nebulous term This is a bonus topic as I’m working through this series on Automating Cybersecurity Metrics and reading other cybersecurity material simultaneously. I have run across a number of interesting definitions of cloud over the years and just recently read one again which prompted me to write this post. It’s just a random […]
Cyber News, Cyber Threat Trends