cybersecurity
RSA 2014 Keynote – Scott Harrison, Charity : water
Published on Feb 28, 2014 Seven years ago Scott Harrison started charity: water with a mission to bring clean drinking water…
Read More »State of the Hack: One Year after the APT1 Report
Published on Feb 25, 2014 Nawaf Bitar Senior Vice President and General Manager, Security Business Unit, Juniper Networks, Inc. We are…
Read More »RSA 2014 Keynote – Philippe Courtot, Qualys
Published on Feb 28, 2014 Security professionals in general distrust the cloud—losing control, fly-by-night third party solutions, privacy and surveillance. However,…
Read More »Episode 9 – “Curiosity’s Claws” (End)
Welcome to Republic of South Sylvania. Mobile and cloud based technology influence every interaction citizens make. See what happens when…
Read More »Episode 8 – “Someone to Lynch”
“2020” is the story about the near future based on an ICSPA report entitled Project 2020. This video project takes…
Read More »Episode 7 – “Keep it Offline
“2020” is the story about the near future based on an ICSPA report entitled Project 2020. This video project takes…
Read More »Episode 6 – “Hacktivist”
“2020” is the story about the near future based on an ICSPA report entitled Project 2020. This video project takes…
Read More »Episode 5 – “In It All The Way”
“2020” is the story about the near future based on an ICSPA report entitled Project 2020. This video project takes…
Read More »Episode 4 – “Have You Seen This Boy?”
“2020” is the story about the near future based on an ICSPA report entitled Project 2020. This video project takes…
Read More »Episode 3 – We Didn’t See It Coming
Episode 3: “We Didn’t See It Coming” Welcome to Republic of South Sylvania. Mobile and cloud based technology influence every…
Read More »-
General
CyberSecurity Forum @ BBU
កាលពីថ្ងៃទី ១១ ខែកញ្ញា ឆ្នាំ២០១៣ កន្លងទៅនេះ នៅឯសាកលវិទ្យាល័យប្រៀលប្រាយ បន្ទប់លេខ ២០១ មានបើកនូវវេទិការជជែកពិភាក្សាស្តីពី សន្តិសុខតាមប្រព័ន្ធអិនធឺណែត (CyberSecurity Forum) ដែលរៀបចំឡើងដោយនិសិ្សតឆ្នាំទីបួន ជំនាញដាតាបេស។ ខាងក្រោមនេះគឺជាឯកសារនានាដែលបានប្រើប្រាស់ក្នុងវេទិការ សូមធ្វើការទាញយក៖ 1. 01-Understanding-KeyLogger 2. 02-Email-Security 3. 03-Understanding-Phishing-Attack…
Read More » Q&A from the Maxon Lecture on Effective Cybersecurity
The 13th Annual Robert P. Maxon Lecture, hosted by George Washington’s School of Business and GW’s Institute for Corporate Responsibility,…
Read More »EU Cyber Security Strategy
Joint press conference by Joint press conference by Cecilia MALMSTRÖM, Member of the EC in charge of Home Affairs, Neelie…
Read More »Cyber Security for Business Roundtable: A New Way Forward
Business Today hosts its latest roundtable on cyber security. This roundtable analyses the current cyber security threat to UK Plc…
Read More »