|
This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security architect. Providing more than…
name
Rob Krug Date
02/08/2019
|
|
Karun Rajasekharan: Honeywell Building Technologies develops and releases hundreds of
products across the globe with over 100 Scrum teams. Product security has been
identified as a key product…
name
Karun Rajasekharan, Emil Man Date
02/01/2019
|
|
Lyft’s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as possible. This streamlined process is great for users, but…
name
Sam King Date
01/25/2019
|
|
The massive generation and collection of digitized health data, e.g. electronic health records (EHRs), along with these notable, longstanding healthcare deficiencies including diagnostic errors and…
name
Cao (Danica) Xiao Date
01/24/2019
|
|
Information security certifications, frameworks, and regulatory requirements provide a good foundation for startups to build an information security program. Since a security breach could put a…
name
Nir Valtman Date
01/18/2019
|
|
Despite all the advancement in authentication schemes, text-based authentication is perhaps still the most common way of user authentication (e.g., textual passwords or personal identification…
name
Maliheh Shirvanian Date
01/11/2019
|
|
The state of art and the state of practice is not keeping up with today’s cyber challenges, and as a result, adversarial activities are becoming increasingly effective in disrupting mission…
name
Kevin Greene Date
11/30/2018
|
|
name
Hyungjoon Koo Date
11/16/2018
|
|
Ever wondered what happens behind the scenes when a large company experiences a data breach? How, for example, do forensics and policy teams integrate and collaborate with all the other business…
name
Todd McClelland Date
11/02/2018
|
|
name
Weidong Cui Date
10/26/2018
|