Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged cybersecurity

Rss Feed Group items tagged

Malak Elmousallamy

Hacked Chamber of Commerce Opposed Cybersecurity Law - 0 views

  •  
    This is another example of the debate on whether security or privacy is more important.
Derek Bruff

Securing Medical Research: A Cybersecurity Point of View (Bruce Schneier) - 0 views

  •  
    "The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work. "
Derek Bruff

Andy Greenberg (@a_greenberg) | Twitter - 0 views

  •  
    Andy Greenberg covers cybersecurity and hacking for Wired magazine.
Derek Bruff

Nicole Perlroth (@nicoleperlroth) | Twitter - 0 views

  •  
    Nicole Perlroth covers cybersecurity for the New York Times.
krschroeder9

The Importance of Understanding Encryption in Cybersecurity - 0 views

  •  
    Any sensitive information that could be accessed by hackers should be encrypted, especially when communicating over wireless networks. Make sure to keep your private key confidential.
whitnese

3Qs: Password and cloud security - 3 views

  •  
    This article discusses the recent cloud hacks and security questions in general.
rmusicant

NSA debate takes new turns after Paris attacks - 4 views

  •  
    Privacy advocates are pushing back against arguments from the intelligence community that more surveillance powers would have prevented the deadly Paris terrorist attacks. They're offended at what they see as naked opportunism from supporters of tough surveillance powers and argue the rhetoric - including suggestions that National Security Agency leaker Edward Snowden has blood on his hands - has gone too far.
j_olsen

The Privacy Blog: Privacy, Security, Cryptography, and Anonymity - 4 views

  •  
    This blog is all about privacy, as the title suggests. The majority of the blog posts use actual examples, such as the Ashley Madison hack, in order to reveal important cybersecurity lessons. One particular blog post explains how Passages, a secure virtual browser, is a lot like hand sanitizer for the web. I thought that this blog was particularly interesting because it had a lot of relevant, unique examples about privacy and cryptography in the modern world.
wmcrae

Elsa B. Kania (@EBKania) | Twitter - 0 views

  •  
    Posting two due to this being a student. Provides interesting insight nonetheless
Derek Bruff

Nicole Perlroth - 0 views

  •  
    This journalist covers cyber-security and seems to know her stuff.
anonymous

VPN Security News (@vpnSecurityNews) | Twitter - 2 views

  •  
    This one is a little sketchy. It's just links to articles on VPNs from news sources I haven't heard of. Can you find someone a little less spammy and a little more likely to be a real person?
1 - 20 of 23 Next ›
Showing 20 items per page