Tag Archive for: tank

Shark Tank Season 15 LIVE — Fans praise Arepas and ‘can’t wait to try them’ as Meggings fails to secure a deal


Thousands of individuals apply to be on show

Shark Tank can receive more than 100,000 applications every season, through the show’s website or during open casting calls to “audition, according to MentalFloss.

The show has around 31 episodes per season and producers are usually looking to fill close to 100 slots.

TJ Hale, the host of Shark Tank Podcast, which follows up on contestants and keeps a log of show statistics says “The odds are against you,” appearing on the show.

Get to know the sharks: Robert Herjavec

Robert Herjavec is a businessman born on September 14, 1962, in Varaždin, Croatia.

When he was seven, he and his family moved to Canada, where he later graduated with an English and Political Science degree from the University of Toronto.

Herjavec is the founder of BRAK Systems, a Canadian integrator of internet security software.

He sold the company to AT&T Canada in 2000 for $30.2million.

Three years later, he founded the Herjavec Group, which is one of the largest information technology and computer security companies in Canada.

Herjavec has been featured on reality TV series such as CBC’s Dragons’ Den and Shark Tank.

Get to know the sharks: Daymond John

It is believed that businessman and motivational speaker Daymond John has a net worth of $350million.

“Daymond John has come a long way from turning a $40 budget into FUBU, a $6 billion fashion game-changer,” reads his website.

“Throughout his career, Daymond has continued to be an entrepreneur in every sense of the word.

“He is not only a pioneer in the fashion industry but a Shark on the 4-time Emmy Award winning Shark Tank, a New York Times best-selling author, branding guru, and highly sought-after motivational speaker.”

FUBU is an American hip-hop apparel company launched by John and others. FUBU stands for “For Us, By Us.”

Get to know the sharks: Mr. Wonderful

Kevin O’Leary was born in Montreal, Quebec, Canada, on July 9, 1954. The 68-year-old is a businessman, author, politician, and television personality.

O’Leary has appeared in the business news programs SqueezePlay and The Lang and O’Leary Exchange.

Since 2009 he’s been a main cast member on ABC’s Shark…

Source…

Security Think Tank: Why “secure coding” is neither


There’s a little bit of a trap sometimes that can arise in the way that humans understand and process language. Specifically, sometimes we take the meaning of a word or phrase for granted. By this, I mean we use a term meaning a given thing, only for those hearing us to understand the term in a completely different way.

This is counterproductive when it happens in day-to-day communication, but can be dangerous in the context of risk-impacting disciplines such as cyber security, assurance, and governance. In these situations, it can create risk.

I bring this up because often we hear about ways to ensure “secure coding” in organisations that author and maintain software as part of their business, either for internal or external use. It’s important because, frankly, most businesses fall into this category nowadays. While it’s natural to discuss the challenges of software risk this way, I believe the term “secure coding” itself presupposes a context that makes the intended end state actually harder to achieve – at least when taken literally.

And I don’t mean this just in a semantic sense. For example, I’d argue that understanding why that statement is true has actual, tangible, practical value. It speaks to the root cause of why many organisations struggle with application and software risk, and it highlights practical steps organisations can take to improve. With that in mind then, let’s unpack what actual software risk reduction goals are, and how best to effect them as we fulfil our requirements to develop and publish software safely and resiliently.

Software development security vs. risk reduction

The first thing to unpack is the intended end state of what we mean by “secure coding.” In my opinion, there are a few different, related goals usually intended by this term. First, by “security” in this context, folks typically mean two things:

  1. Employing application architecture and design patterns that foster risk reduction principals (e.g., confidentiality, integrity and availability)
  2. Creating software that is resilient to attack (e.g., via avenues like vulnerabilities and misconfigurations) 

Both of these things are, of course, incredibly…

Source…

Tank storage company Vopak hacked, Ransomware groups report


Several parties monitoring hacker groups reported that the tank storage company Vopak has been the victim of the hostage software Ransomware in Malaysia. The attack was reportedly exceeded by a hacking group linked to Russia, RTL Nieuws wrote . Key business information, including the company’s tank infrastructure and systems, was allegedly captured. However, Vopak claimed that its business operations in the Netherlands have not been compromised.

On Twitter the tank storage company wrote that “We can confirm that at Pengerang Independent Terminals (PTSB) in Malaysia there is an IT incident that resulted in the unauthorized access of some data. The terminal continues to operate. The incident is being investigated. We apologise for any inconvenience.”

“Unauthorized persons have gained access to our data”, confirmed Vopak. “The incident is being investigated, we apologize for any inconvenience,” RTL Nieuws reported.

Apparently, Vopak got hacked by the Ransomware group BlackCat, which has become known for publishing stolen images of breast cancer patients, according to the television programme.

Vopak is known for storing fossil fuels such as oil and liquefied natural gas (LNG). The listed company, whose history dates back to 1616, operates in the Netherlands with terminals in the port of Rotterdam and Eemshaven in Groningen. It also operates in dozens of countries worldwide.

The so-called “hostage software” ransomware is used by hackers to lock down companies’ systems. If they do not pay, those systems will not be unlocked or the captured information will be sold or published. This week, it also became known that the KNVB football association was a victim of such a hack.

Source…

Security Think Tank: In 2023, we need a new way to cultivate better habits


How are those New Year’s resolutions working out for you? With 2023 now well underway, many of your best intentions for the year may have already been adjusted, deferred or abandoned entirely. You’re only human, after all.

It’s often the same with employee cyber security training. At many organisations, staff are required to complete a training course once or twice a year. The content is typically very corporate, and the narration is relatively generic. These sessions will typically cover a lot of ground in a short period, explaining common cyber security risks, presenting corporate policies and highlighting best practices for keeping data and systems safe.

If the session is well-designed, if it’s delivered engagingly, and if employees give it their full attention — and that’s a lot of ‘ifs’ already — then participants may leave with the best of intentions to put their new-found knowledge to use. But soon, the pressures of working life or good old-fashioned forgetfulness kick in, scuppering their resolve. They quickly slip into the same old bad habits, paying less attention as they work fast, trying to do three things at once, consequently becoming more susceptible to social engineering attempts.

That’s why I think that, in 2023, we need to go much further than just periodic online cyber security training if we are going to help our workforce get out in front of the bad guys. We need a newer, better approach.

Atomic habits

With this in mind, I recently revisited Atomic Habits by James Clear, a number one New York Times bestseller with 10 million copies sold worldwide. In his book, the author argues that real transformation comes from the compound effect of making regular small changes to behaviour. He calls these ‘atomic habits’.

As a CISO, I see how this approach could work well with corporate cyber security. Of course, periodic training sessions may still have their place, but a culture of cyber awareness can only flourish when employees are encouraged to keep on track and adhere to best practices through regular, timely nudges in the right direction.

So what might this look like? For me, it’s about embedding security reminders, alerts and…

Source…