• Security Intelligence

    Security Intelligence

    How Do You Know if Your Privileged Accounts Are at Risk?
    Published. September 18, 2018

    Since the majority of data breaches involve privileged accounts, it's critical to keep those accounts as secure as possible. The post How Do You Know if Your Privileged Accounts Are at Risk? appeared first on Security Intelligence....

  • MS Security

    MS Security

    Save money on actuarial compute by retiring your on-premises HPC grids
    Published. September 4, 2018

    No insurance company should keep on-premises compute grids for actuarial computing. In the past, resistance to the cloud went along these lines: the cloud has a lack of data security, the cloud is expensive, and no one has experience with the cloud....

  • Victor Chertakovsky

    Victor Chertakovsky

    How to Charge Lithium Iron Phosphate Rechargeable Batteries
    Published. September 2, 2018

    Lithium Iron Phosphate batteries are safer than Lithium-ion cells and are available in a range of huge cell sizes between 5 and 100 AH with much longer cycle life than conventional batteries...

  • All About Microsoft

    All About Microsoft

    Microsoft to offer paid Windows 7 Extended Security Updates
    Published. September 6, 2018

    Microsoft is stepping up its Windows 7 migration campaign with a paid security update option, Desktop App Assure service and more....

  • Electronics Engineering Video Blog

    Electronics Engineering Video Blog

    EEVblog #1110 – Mailbag
    Published. August 9, 2018

    More than an hour of Mailbag! Forum HERE SPOILERS: Sony DVO-1000MD medical device video DVD recorder teardown 8:09 Security ISA card teardown from the 1980’s 18:39 Power Grid the board game! 25:02 USB soldering iron 27:21 TI-nSpire CAS+ calculator PROTOTYPE! 35:28 DIY JBC/Hakko soldering iron controller 41:49 UV LED lamp for PCB exposure 45:10 DIY ......

  • Cyber Defense

    Cyber Defense

    "Q & A with Stephen Sims, SEC599 Co-Author"
    Published. August 3, 2018

    Meet Stephen Sims.Stephen Sims is an industry expert with over 15 years of experience in information technology and security. Stephen currently works out of San Francisco as a consultant performing reverse engineering, exploit development, threat modeling, and penetration testing. Stephen has a MS in information assurance from Norwich University and is a course author and … Continue reading Q & A with Stephen Sims, SEC599 Co-Author...

  • Mocana IoT Security Blog

    Mocana IoT Security Blog

    Introducing Mocana TrustCenter - Simple, Scalable and Automated IoT Security Lifecycle Management
    Published. April 11, 2018

    Today, Mocana ™ announced the launch of Mocana TrustCenter™, a new services platform that provides a system of cybersecurity to manage security across the lifecycle of IoT and industrial control devices. This is the first end-to-end platform for the management of cybersecurity across the IoT device security lifecycle for development, manufacturing, device onboarding, management and update. Mocana TrustCenter is a services platform that is hosted on a private cloud or public cloud IaaS. It includes...

  • From Silicon to Software

    From Silicon to Software

    Making Crypto History: The Women of Bletchley Park
    Published. April 9, 2018

    Remember the movie The Imitation Game? The film depicts Alan Turing and his team at Bletchley Park trying to crack the Enigma machine and decrypt German intelligence codes for the British government during World War II. While modern cryptography relies on complex algorithms and asymmetric key encryption to keep data secure, prior to the 1970s […]...

  • Stephane Boucher's DSP Blog

    Stephane Boucher's DSP Blog

    Elliptic Curve Cryptography
    Published. November 16, 2015

    Secure online communications require encryption.  One standard is AES (Advanced Encryption Standard) from NIST.  But for this to work, both sides need the same key for encryption and decryption.  This is called Private Key encryption.  Public Key encryption is used to create a private key between two sides that have not previously communicated.  Compared to the history......

  • TI E2E Community

    TI E2E Community

    Blog Post: Exploring the impact of IoT on innovation
    Published. July 17, 2018

    Ten years ago, before Internet of Things became a buzzword, our company had a simple idea to make it easier for developers to add complex radio technologies such as Wi-Fi® to their embedded applications. The prospect was mind-blowing. Wireless connectivity would open doors for customers, allowing them to collect data and provide an unlimited range of new services. It was like the early days of the World Wide Web, when the sky was the limit. Wi-Fi was an easy technology choice, available virtually...

  • Industrial Control Systems Security

    Industrial Control Systems Security

    "Preparing for Cyber Security Incidents"
    Published. September 26, 2017

    This blog post was written by ICS515 instructor,Kai Thomsen. Talk with any incident responder and you'll learn that there are a few less glamorous parts of the job. Writing the final report and preparation in advance to an incident are probably top contenders. In this article I want to focus on preparation and explain to … Continue reading Preparing for Cyber Security Incidents...

  • Krebs on Security

    Krebs on Security

    ‘LuminosityLink RAT’ Author Pleads Guilty
    Published. July 16, 2018

    A 21-year-old Kentucky man has pleaded guilty to authoring and distributing a popular hacking tool called "LuminosityLink," a malware strain that security experts say was used by thousands of customers to gain unauthorized access to tens of thousands of computers across 78 countries worldwide....

  • Linux and Open Source

    Linux and Open Source

    IBM's new Nabla containers are designed for security first
    Published. July 16, 2018

    IBM claims its new container design is more secure than Docker or other containers by cutting operating system calls to the bare minimum and thereby reducing its attack surface as small as possible....

  • Tech Design Forums Blog

    Tech Design Forums Blog

    Holistic verification change needed for self-driving cars
    Published. June 19, 2018

    Verification of the coming generation of highly autonomous vehicles needs says Peter Davies, director of security concepts at Thales....

  • Verification Horizons Blog

    Verification Horizons Blog

    Accellera Proposes a New Working Group
    Published. April 6, 2018

    Accellera to explore the need for an IP Security Assurance Standard In the era of SoC design where major design intellectual property (IP) blocks come from multiple sources and are combined to create an SoC or major block to be incorporated into yet another SoC, how can one test such systems to ensure they are […]...

  • Gabe On EDA

    Gabe On EDA

    ARM TechCon Report on IoT, Automotive, and Security
    Published. November 1, 2017

    ARM TechCon Report on IoT, Automotive, and Security Gabe Moretti Wed, 11/01/2017 - 07:58...


    Disk, SSD, NVMe preparation tools cleaned up and on GitHub
    Published. September 14, 2017

    These are a collection of (MIT licensed) tools I’ve been working on for years to automate some of the major functionality one needs when setting up/using new machines with lots of disks/SSD/NVMe. The repo is here: . I will be adding some sas secure erase and formatting tools into this. These tools wrap other […]...

  • Functional Verification Blog

    Functional Verification Blog

    Sign Up For Free Verification Sessions -- Only A Few Days Left
    Published. July 19, 2010

    Mark your calendar and sign up for the two upcoming free verification sessions sponsored by Cadence. Space is limited. So, please sign up today! JULY 21 st All-Day, Hands-on technical workshop in Irvine, CA Topic: Advanced Verification Techniques using e /SV Workshop Learn how to architect an advanced testbench using OVM/UVM that contains generation, coverage and checking and much, much more..... This workshop will focus on introducing attendees to advanced verification techniques using the latest...

  • Electrical Engineers  Talk Tech

    Electrical Engineers Talk Tech

    Does Secure Erase Actually Work?
    Published. July 18, 2016

    Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using the flash manufacturer’s secure erase feature—since so many DoD documents recommend it. In Part 1 of this blog (“How Does One … Continue reading →...

  • Rands In Repose

    Rands In Repose

    Turn on 2FA before it’s too late
    Published. July 17, 2016

    Two-factor authentication (“2FA”) is intended as another layer of security to your online accounts, so if your password is hacked, your account can’t be accessed without a special code. While I clearly understand the value, I’ve been lazy about enabling on various services since… it’s a hassle. I’ve only enabled it when I’ve been required… More#...

  • Ed Burnette's Dev Connection

    Ed Burnette's Dev Connection

    More Android malware FUD is the only thing that is sprouting
    Published. August 8, 2012

    Yesterday, ZDNet's Rachel King picked up a malware story from security vendor Webroot. Now questions have arisen about the accuracy of the article, and the tactics and credibility of the vendor....

  • Laptops and Desktops Blog

    Laptops and Desktops Blog

    Fujitsu adds Intel Broadwell processors to new enterprise tablets, laptops
    Published. January 28, 2015

    The mobile devices include a pair of Ultrabooks and feature optional palm-based biometric security features....

Share and Enjoy:
  • Digg
  • Sphinn
  • Facebook
  • Mixx
  • Google
Extension Media websites place cookies on your device to give you the best user experience. By using our websites, you agree to placement of these cookies and to our Privacy Policy. Please click here to accept.