Sunday, July 10, 2016
The Future of Luxury Car Brands in a Self-Driving City
›
For the automotive manufacturing industry, the next couple of decades are going to be make or break for most of the well known brand names w...
Saturday, July 9, 2016
Next Generation Weapons: The Eye Burner Rifle
›
The fantasy worlds of early 20th Century science fiction writers, in many ways, appear to be "now-ish" in terms of the technologie...
Friday, January 29, 2016
Watching the Watchers Watching Your Network
›
It seems that this last holiday season didn’t bring much cheer or goodwill to corporate security teams. With the public disclosure of remote...
Shodan's Shining Light
›
The Internet is chock full of really helpful people and autonomous systems that silently probe, test, and evaluate your corporate defenses e...
Friday, November 20, 2015
Battling Cyber Threats Using Lessons Learned 165 Years Ago
›
When it comes to protecting the end user, the information security community is awash with technologies and options. Yet, despite the near ...
Wednesday, November 18, 2015
Exploiting Video Console Chat for Cybecrime or Terrorism
›
A couple of days ago there was a lot of interest in how terrorists may have been using chat features of popular video console platforms (e.g...
Tuesday, November 17, 2015
Panel Selection of Penetration Testing Vendors
›
Most large companies have settled into a repeatable model in the way they undertake penetration testing and engage with their penetration t...
Monday, November 9, 2015
The Incredible Value of Passive DNS Data
›
If a scholar was to look back upon the history of the Internet in 50 years’ time, they’d likely be able to construct an evolutionary timeli...
‹
›
Home
View web version