5 lessons I learned from my first IoT project
Posted on 21 December 2016 by
7 years ago, I started my first IoT project for Gemalto. Here are 5 lessons I learned from this adventure.
Posted on 21 December 2016 by
7 years ago, I started my first IoT project for Gemalto. Here are 5 lessons I learned from this adventure.
Posted on 16 April 2013 by
Law enforcement organizations looking for the best solution to move to advanced authentication and meet the CJIS mandate have received some good news: they now have until 2014. CJIS is the U.S. Federal Bureau of Investigation’s Criminal Justice Information System (CJIS). It is the primary central repository for criminal justice information and the focal point […]
Posted on 31 May 2011 by
When I refer to a whale, I am referring to your boss or, in some cases, you! A whale in information security lingo is a person with significant assets or access and whaling (as outlined by Bob Violino on CIO) is but one of many types of cyber attacks that are evolving. From phishing and pharming to spear phishing, the list goes on.
Posted on 14 March 2012 by
Facebook and Google have been under the spotlight recently for the way they deal with online identities. These are just some of the most high profile examples, but have helped drive heightened awareness of our online identities and privacy settings. This week’s SXSWi is understandably awash with debates about what the future might look like […]
Posted on 20 June 2013 by
The United States social security card dates back to 1936 and it hasn’t changed much since then. A small piece of paper the size of a ticket stub holds one’s social security number that is an American’s life line for identity verification, employment eligibility, and citizenry. The paper card is not quite up to date […]
Posted on 03 July 2012 by
Terrorists. Organized crime and drug cartel kingpins. Fraudsters. Serial killers. Sex offenders. Name a criminal and there is one place you can find them all—the US Federal Bureau of Investigation’s Criminal Justice Information System (CJIS). After the 9/11 commission showed that terror attacks on the World Trade Center might have been prevented by better communication, […]