One day Connor Tumbleson got an email saying his identity has been stolen. And this was one of the strangest days he’s ever had. Sponsors Support for this show comes…
Sam Bent, a.k.a. DoingFedTime, brings us a story of what it was like being a darknet market vendor. Learn more about Sam at https://www.doingfedtime.com/. Sponsors Support for this show comes…
Jack is currently on a break. Here is a an episode from the Spycast podcast called "Black Ops: The Life of a Legendary CIA Shadow Warrior". To learn more about…
Andy Greenberg (https://twitter.com/a_greenberg) brings us a gut wrenching story of how criminal investigators used bitcoin tracing techniques to try to find out who was at the center of a child…
Join us as we sit down with Jason Haddix (https://twitter.com/Jhaddix), a renowned penetration tester who has made a name for himself by uncovering vulnerabilities in some of the world’s biggest…
Patch Management is is one of the most critical activities in any organization's security. Failure to achieve effective patching cadence can lead to vulnerability exploitation, financial and reputational damages.
Security Compliance Audit takes into account various security measures that are either point in time adherence or are to be maintained throughout the audit period.
security aims to protect digital data from attackers, from the unwanted actions of unauthorized users and accidental disclosure such as a cyber attack or a data breach.
In this post we will go through the major sections of Indian Information Technology Act. Although this is a very high level overview, it will still help you to understand what all are the offense and what punishment can a culprit be sentenced if found guilty.