Jump to content
Hak5 Forums


Active Members
  • Content count

  • Joined

  • Last visited

  • Days Won


About WaterRide

  • Rank
    Hak5 Fan
  1. Infosec Education

    Where are you living? In the UK there are a number of cyber information courses run by universities which teaches all students with zero knowledge of the subject and by the end of the degree you have gained a solid understanding of networks, crypto, pen testing, policy....
  2. Are you or your company engaging friends or staff during Cyber Security Awareness Month this October? I was pleased to see Donald encouraging Americans to be aware of the cyber risks affecting small and large businesses: President Donald J. Trump Proclaims October 2017 as National Cybersecurity Awareness Month | whitehouse.gov
  3. General NANO Discussion

    Q: I received my Nano today but what's the right program to install the .bin file?
  4. GDPR

    Keen to learn how involved you or your security colleagues are in the new general data protection legislation changes at your company? Have you undertaken any external courses to help you?
  5. Dark web screenshots

    I’m due to give a presentation later this month and going to reference the dark web. I’ve never used it but wondering if anyone here does or has, and if they can share with me screenshots of what it looks like, particularly the homepage as you enter the dark web. I would like to include these images in my presentation
  6. Many of our users have access to Office 365 / SharePoint but the way it is currently configured staff are able to access everything they have been given permission to outside the corporate network. Any one here use SharePoint in business? If so, what have you done to block all (or limit) external access to Office 365 for members of designated groups. TIA
  7. Last night I was having drinks in the bar where I met and chatted to a lady. She's a graduate and currently working for Deloitte. She was fascinated with what I do and mentioned she tried to get into cyber consultancy at her firm but was put off by the men who was sexist and belittled her. She's not the first female to be put off working in this industry because of the actions of few. The old-boys networks still dominate this industry when it comes to hiring staff; and the lack of female role models in the field means a cyber security career can seem unrealistic to most. I offer mentoring and access to my network for some, but how can we encourage more women into this field? How do we change the behaviours of some (a lot of) men who still see girls as eye candy or only good for admin tasks?
  8. We're looking to implement DLP. If you have it where you are, what are the strengths and weaknesses of DLP products you currently have?
  9. The CISO Role

    Your final quote is worthwhile, thanks. I guess it shows that a contracted CISO from a consultancy may benefit from us implementing certain products (e.g. getting a bonus or cut of the sale).
  10. Best Password Manager?

    Just wanted to share this link if anyone is interested: http://uk.pcmag.com/password-managers-products/4296/guide/the-best-password-managers-of-2016
  11. The CISO Role

    I love meeting other InfoSec professionals at other companies as it opens my eyes to what their risk priorities are and how they educate their staff good security behaviour, for example. Recently I hmet mates in one company where they do not have a CISO per say, rather a senior manager who they report to - do you think an explicit CISO role is needed? I would say "yes" as this person is an expert and has their team's interest at heart and take ideas and concerns to the Senior Managers. Also, one company had a CISO who is contracted from an external consultancy firm - should a CISO be a permanent employee? As much a CISO should bring knowledge, does having a contracted CISO bring potential conflicts of interest (especially if they are from a consultancy firm)?
  12. Like Pokemon GO? You should definately try Ingress.

    Does Ingress come with the same security/privacy risks like PokemonGo?
  13. Hi, My friend got their facebook and twitter account hacked. Do any members know if it's possible to find out 1) who could have done it? (unlikely I know) 2) location of the hack? (if Q1 is unlikely, at least by narrowing the location of the compromise can help narrow down who did it). TIA : )
  14. Introduce yourself

    Hello everyone I am new to the forum : ) I am starting a masters in information security and currently doing lots of research on security management and testing. Look forward to getting involved in the forum and products : ) Nationality: Finn Sex: Male Age: 22 Race: Euro-Asian Occupation: student