May 9, 2022, 6:41 p.m. | Paul Ducklin

Naked Security nakedsecurity.sophos.com

Imagine if you could assume the identity of, say, Franklin Delano Roosevelt simply by showing up and calling yourself "Frank".

bug cve-2022-29176 logs rip ruby rubygems supply supply chain suppy chain vulnerability

Information Security Engineers

@ D. E. Shaw Research | New York City

Strategic Portfolio Leader - Communications and Electronic Warfare

@ Babcock | Bristol, GB, BS16 1EJ

Senior Security Analyst (GRC)

@ ASOS | London, United Kingdom

Ingénieur(e) Réseaux et Firewalling Cybersécurité - Toulouse

@ Sopra Steria | Colomiers, France

Security Lead - Malaysia

@ Control Risks | Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia

Cyber Security Engineer

@ Ecolab | IND-Bengaluru