(RPD) RAPID7 Sees Q3 Revenue Range $196M - $198M Rapid7 Swings to Q2 Non-GAAP Earnings, Revenue Rises Updates 2023 Outlook Morgan Stanley Adjusts Price Target on Rapid7 to $52 From $48, Maintains Equal-Weight Rating Like the show? Want to keep Jen and Tod in the podcasting business? Feel free to rate and review with your favorite podcast purveyor, like Apple Podcasts. ![]() Peruse Discourse's technical blog post about it.Ĭheck out Discourse's security program and policies. See Discourse's announcement of the vulnerability on GitHub. Read the CISA notification on the critical RCE vulnerability in Discourse. Listen to our previous episode with Jack on election security. At Stanford, Jack is a research assistant with the Stanford Internet Observatory and Stanford Empirical Security Research Group and launched Stanford's bug bounty program, one of the first in higher education. Jack was named one of Time Magazine's 25 most influential teens for 2018. After placing first in the Hack the Air Force challenge, Jack began working at the Pentagon's Defense Digital Service. Jack is a top-ranked bug bounty hacker, having identified over 350 vulnerabilities in companies including Google, Facebook, Uber, Yahoo, and the US Department of Defense. Jack formerly served as an Election Security Technical Advisor at CISA, where he led the development and deployment of Crossfeed, a pilot to scan election assets nationwide. Jack Cable is a security researcher and student at Stanford University, currently working as a security architect at Krebs Stamos Group. ![]() Tod highlights some of the many things Discourse is doing right with its security program. Stick around for our Rapid Rundown, where Tod and Jen talk about a remote code execution vulnerability that open-source forum provider Discourse experienced recently, which CISA released a notification about over the weekend. They chat about how Cable came up with the idea, the role of cryptocurrency in tracking these payments, and how better data sharing can help combat the surge in ransomware attacks. Jack is serving on the Senate Homeland Security and Governmental Affairs Committee under Chairman Peters (D-MI) and working on cybersecurity, misinformation, and disinformation.In this episode of Security Nation, Jen and Tod chat with Jack Cable, security architect at the Krebs Stamos Group, about Ransomwhere, a crowdsourced ransomware payment tracker. ![]() Jack was named one of Time Magazine’s 25 most influential teens for 2018.Īt Stanford, Jack was a Research Assistant with the Stanford Internet Observatory and Stanford Empirical Security Research Group and helped launched Stanford’s bug bounty program, one of the first in higher education. After placing first in the Hack the Air Force challenge, Jack began working at the Pentagon’s Defense Digital Service. Jack is a top ranked bug bounty hacker, having identified over 350 vulnerabilities in companies including Google, Facebook, Uber, Yahoo, and the U.S. ![]() Before that, Jack served as an Election Security Technical Advisor at the Cybersecurity and Infrastructure Security Agency (CISA), where he led the development and deployment of Crossfeed, a pilot to scan election assets nationwide. Jack most recently worked as a security architect at the Krebs Stamos Group. Jack Cable is a hacker who works at the intersection of cybersecurity and public policy.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |