Computing and Information T...
Is this your podcast?
Sign up to track ranks and reviews from Spotify, Apple Podcasts and more
Computing and Information Technology
Listen now
Ratings & Reviews
3.3 stars from 24 ratings
Recent Episodes
Each wave of technology brings its own challenges in terms of new threats and expected safeguards, and it is arguable that we have not caught up with yesterday’s challenges yet. Steven Furnell moderates a panel session with Elisa Bertino, Nancy Cam-Winget, Edgar Weippl, and Ali Ghorbani to...
Published 07/20/17
Nathan Clarke describes two approaches to utilising transparent biometrics for investigating and attributing insider misuse: a proactive approach that embeds biometrics within digital objects (to identify and attribute the source of any stolen information); and a reactive measure that seeks to...
Published 05/11/17
Tiger Team assessments can be specifically tailored to a company's threats (encompassing IT, physical and human security) and reflect the actual risk for the company. Thomas Hackner discusses all three areas and demonstrates typical vulnerabilities, along with the solutions required to protect...
Published 03/28/17
Do you host a podcast?
Track your ranks and reviews from Spotify, Apple Podcasts and more.
See hourly chart positions and more than 30 days of history.
Get Chartable Analytics »