Remove from-anthropologist-to-cybersecurity
article thumbnail

From Academic Anthropologist to Cybersecurity: Lessons Learned

Security Innovation

Entering the world of cybersecurity can be a process that has many more questions than answers, particularly if you don’t have a community to help you along the way. Finding the resources, guidance, and time to jump into a challenging field can intimidate many and often discourages talented minds from fully exploring their capabilities.

article thumbnail

Cybersecurity Style Guide helps you write like a hacker

The Parallax

The Bishop Fox Cybersecurity Style Guide , published last week , was developed over the last year and a half to fill a vacuum, says its lead editor, Brianne Hughes. Related: cybersecurity. Bishop Fox defines the “related” term, “cybersecurity,” as such: Defense contractors and government officials use this term or “infosec.”

Security 190
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Register With 20% Discount Code for San Jose Strata Hadoop World

CTOvision

This is the place to dive deep into the latest on Big Data, Analytics, Artificial Intelligence, IoT, and the massive cybersecurity issues in all those topics. Learn how to take big data from science project to real business application. The Feb 17-20 Strata Hadoop World in San Jose has an incredible line up of speakers and hot topics.

article thumbnail

When hackers target a conference code of conduct

The Parallax

Draper was banned from multiple hacker conferences last year, following numerous public reports on his decades-long attacks against young men and boys in the hacker scene. How the myth of meritocracy stymies women in cybersecurity. READ MORE ON TRENDS IN HACKER CULTURE. At Chaos, a chaotic response to assault allegations.

article thumbnail

New sexual-assault allegations against ‘phone phreaker’ John Draper

The Parallax

How the myth of meritocracy stymies women in cybersecurity. Over five to six hours, their conversation ranged from hacker exploits to workout techniques Draper says he learned from a “guy in Russia.” He darted from store to store, dodging traffic.” Jay, a hacker in the San Diego area, was excited to meet John T.