Skip to main content

Home/ Groups/ CSIA 459
1More

Cyber War 2.0 -- Russia v. Georgia - 0 views

  •  
    Fun article about the cyber side of the 2008 conflict, good read.
1More

Cloud computing and collaboration - 0 views

  •  
    Takes a different perspective about cloud services and how to incorporate them.
1More

Applying security policies and service level agreement to IaaS service model to enhanc... - 0 views

  •  
    Great Resource no Cloud computing and a bit more technical.
1More

Cloud Compliance: Tackling Compliance in the Cloud - 0 views

  •  
    Most organizations already have started to use virtualization technology or cloud computing. Yet some still may be reluctant to move their mission-critical-tier-1 - applications to these relatively new environments. While the flexibility and cost benefits of virtualization are widely accepted, questions linger on how to adapt to new and different risks.
1More

Six security issues to tackle before encrypting cloud data - 1 views

  •  
    Concern about security and privacy in the cloud will drive adoption of cloud encryption systems, but Gartner warns there are six security issues that businesses should tackle. The expected compound annual growth rate of software as a service (SaaS) from 2011 to 2016 is 19.5%, platform as a service (PaaS) 27.7%, infrastructure as a service (IaaS) 41.3% and security services spending 22%.
1More

Cloud Computer Security - 0 views

  •  
    This is great explanation of security threats associated with cloud computing on the 3 available options in cloud computing: Infrastructure, Platform & Application.
1More

Cloud Computing Explained - 0 views

  •  
    This was a simple video that broke down cloud computing to its simplest form. I liked how it explained the billing and information use of the concept.
2More

US-CERT | United States Computer Emergency Readiness Team - 3 views

  •  
    US-CERT's mission is to improve the nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the nation.
  •  
    The "Alerts And Tips" page of this site provides excellent up to date alerts. (http://www.us-cert.gov/ncas). Subheadings include: Current Activity, Alerts, Bulletins, and Tips. The Bulletins page provides weekly vulnerability summaries. It's worth a look for anyone who hasn't seen this already.
1More

IT Security Threats | Symantec - 0 views

  •  
    Excellent emerging threat resource using graphical charts displaying daily security threats, including malware, security risks, vulnerabilities, and spam.
1More

Threat Level - Privacy, Crime and Security Online | Wired.com - 0 views

  •  
    News oriented site that covers breaking news on Privacy, Crime and Security Online.
1More

Free IT Community, Help Desk, and Network Monitoring - Spiceworks - 2 views

  •  
    Do your job, talk-shop with IT pros and vendors...and get the scoop on everything from products and services to zombies and bacon (yup, seriously). All in one place. All for free! Download Free App Join Free Community Tech vendor? We can help you too! Learn how "
2More

SANS Newsbites - 2 views

shared by Lee Bry on 09 Jul 13 - No Cached
  •  
    A site that you can subscribe to bi-weekly updates to computer security as a way to keep current on potential emerging threats.
  •  
    This is a great site with a simple archive system. I read the article on the 80% increase for android malware in China. The Android platform is a security nightmare. Everyday it seems like a new exploit is exposed and it takes months for a update.
1More

DNA goes digital - 2 views

  •  
    This makes complete sense to me but seems like something in a science fiction book. The ability to put mankind's years worth of data on a few grams of DNA seems far reaching to me but interesting all the same.
1More

Dark Reading | Security | Protect The Business - Enable Access - 1 views

shared by Marilyn Morgan on 09 Jul 13 - Cached
  •  
    Dark Reading is a comprehensive source of news, commentary and analysis on cybersecurity, designed for use by IT security professionals.
1More

Facebook's Graph Search available to all in U.S. - CNN.com - 0 views

  •  
    Description of Facebook's graph search and the privacy concerns around it.
1More

UW Experimental Computer Engineering Lab - Securing Emerging Technologies - 0 views

  •  
    Unexpected security risks can arise with new, emerging computer technologies. We seek to stay one step ahead of the "bad guys" and identify, measure, and learn from their risks before actual threats manifest. We co-led the first experimental study of the computer security properties of wireless implantable medical devices.
1More

[1304.5672] Fit and Vulnerable: Attacks and Defenses for a Health Monitoring Device - 0 views

  •  
    Abstract: The fusion of social networks and wearable sensors is becoming increasingly popular, with systems like Fitbit automating the process of reporting and sharing user fitness data. In this paper we show that while compelling, the integration of health data into social networks is fraught with privacy and security vulnerabilities.
1More

Rewritable digital data storage in live cells via engineered control of recombination d... - 0 views

  •  
    Department of Bioengineering, Room 269B, Y2E2 Building, 473 Via Ortega, Stanford University, Stanford, CA 94305 Edited by David Baker, University of Washington, Seattle, WA, and approved April 6, 2012 (received for review February 8, 2012) Abstract The use of synthetic biological systems in research, healthcare, and manufacturing often requires autonomous history-dependent behavior and therefore some form of engineered biological memory.
‹ Previous 21 - 40 of 336 Next › Last »
Showing 20 items per page