Each wave of technology brings its own challenges in terms of new threats and expected safeguards, and it is arguable that we have not caught up with yesterday’s challenges yet.
Steven Furnell moderates a panel session with Elisa Bertino, Nancy Cam-Winget, Edgar Weippl, and Ali Ghorbani to...
Published 07/20/17
Nathan Clarke describes two approaches to utilising transparent biometrics for investigating and attributing insider misuse: a proactive approach that embeds biometrics within digital objects (to identify and attribute the source of any stolen information); and a reactive measure that seeks to...
Published 05/11/17
Tiger Team assessments can be specifically tailored to a company's threats (encompassing IT, physical and human security) and reflect the actual risk for the company.
Thomas Hackner discusses all three areas and demonstrates typical vulnerabilities, along with the solutions required to protect...
Published 03/28/17