Why Your Network Isn’t Secure

Malware secretly copying data from infected computer

--

--

--

CISO, Director of Information Security, and Security Consultant. Also, I wrote some books that have nothing to do with IT. http://www.amazon.com/author/bobyoung

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How to Secure Your Phone for a Protest

Privacy, security, surveillance, spying, spy

Authpaper Faster Safer Cheaper data transfer

{UPDATE} Le Havre: The Inland Port Hack Free Resources Generator

EVENT|BitCherry TESTNET ROUND1 BUG BOUNTY CAMPAIGN

{UPDATE} 旁觀者2 Hack Free Resources Generator

Password Manager Usage Guide

The Geography of Bans

{UPDATE} Bricks Breaker and Balls Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Bob Young

Bob Young

CISO, Director of Information Security, and Security Consultant. Also, I wrote some books that have nothing to do with IT. http://www.amazon.com/author/bobyoung

More from Medium

Runner Up at BPJS Kesehatan Security Hackathon

Much ado about time — UTC and NTP: Part 1

BugBase is now ISO 27001:2013 Compliant

l337 S4uc3 Walkthrough — Cyberdefenders