Hacker says phone app could hijack plane - 0 views
http://resources.idgenterprise.com/original/AST-0084883_2013_Threat_Report.pdf - 1 views
Enterprise Network Guide - 1 views
-
White paper describing impacts and benefits to new technologies and the requirments and pressures for organizations to implement them (Cyber nightmare?)
- ...1 more comment...
-
Hmmm I agree with you both, this seems like a horrible idea. I cannot imagine the amount of people who do not properly update, patch and run security scans on their personal devices, I for one would not want to be connected to that in anyway, especially on a business function. I also have to think heavily about the government and contractors dealing with highly sensitive material and I cannot see these trends happening with them. Not just BYOD but also getting rid of the wired LAN's. Good/interesting post.
-
Testing
2013 Emerging Cyber Threats Report - 2 views
-
Georgia Tech's security summit report
- ...1 more comment...
-
Great article. Thing like this are very interesting to me. The section on Cloud Computing was by far my favorite. This type of technology is emerging and at the same time it has turned into a challenge for attackers to try to break. Security is going to be very vital for this service to work and more likely will be the subject of any topic related to cloud technology. Cloud service providers need to make a stronger statement and provide some type of assurance to the customer. Thanks!
-
I had actually read this article before, but it was good to read it again. While they are many elements that are concerning I find the "filter bubbles" troubling. A user has the right to know that their search results have been filtered. You think you're conducting an open search, only to read this and find out your results may be limited.
Centralized Management | Sourcefire - 0 views
-
Testing.....
- ...1 more comment...
-
Bob, still not sure what was up (prob my issue), I can def. see/comment on it now. The sourcefire technologies you posted stuck out to me mainly in one way...they boast that they are a little bit more secure, which is always good, but at under half the price (of the industry average for IDS). They have many good ideas and tools in place to try and get to the top it seems!
-
I used this product in 2010. Very cool and as I recall rather expensive.
Cognitive biometrics: A very personal login - 2 views
-
Retina and iris scans, fingerprint and palm logins rely on possession of unique anatomical characteristics that you cannot forget as you might a password. But, Kenneth Revett of the British University in Egypt, in El-Sherouk City, reviews the state of the art in an alternative approach to user authentication in the inaugural issue of the International Journal of Cognitive Biometrics.
-
Very interesting article Justin. I like the idea of using biometrics as an authentication layer, vs. relying on a CA to issue digital certificates. In my opinion, biometrics should only use functions that can be read or measured when the person is alive.
-
Biometrics is great for a multi factored authentication. It is a very expensive approach to authenticating as well. I doubt there will be a market for it until the price for implementation drops drastically. I would not use it as a stand alone authentication approach.
How to run your own NSA spy program - 2 views
-
With everything going on in the news about this I found this to be a humorous approach to the whole thing. This article basically describes the NSA program on a fundamental level and how an everyday Joe (if they had enough data storage that is) could create their own spy program using these tactics.
-
A spy kit to go. Virtually everything you need to set up shop to gather information and spy on something ( corporate or private). All the hacking tools are nearly " off the shelf" and are most likely used for spying. Great post and article.
-
This article gave me a headache thinking about all the data collection. I am not surprised by this at all Google and Facebook are the biggest privacy violators out there. At what point do people drop off the grid to hide from this potential? The reality is that most people have no idea that this potential is out there except for the ones that want to exploit it.
Down the Security Rabbithole - 0 views
Local police grapple with abilities to respond to cybercrimes and cyberthreats - 2 views
UMUC Achiever Spring 2013 - 2 views
DHS seeks student hackers - 0 views
Anonymous vs. WBC - 0 views
« First
‹ Previous
41 - 60
Next ›
Last »
Showing 20▼ items per page