Tag Archives: in

The All-Time Computer Science Hero| How Alan Turing Cut WW2 by 2 Years and Saved 20 Million Lives

Read on if you are interested in the following topics:

  • Why the CISO Should Not Report to the CIO
  • Why You Should Assume you Have Been Hacked
  • 6 Kill Chain Fundamentals You Must Know
  • 7 ‘Must Ask and Prove’ Questions a CIO/CISO must ask about their Next Gen Firewall
  • How Can You Deny Command and Control Attacks
  • Cybersecurity Canon Books – Hall of fame for Cyber Security Books – Readers are leaders
  • Scaling Security with Real Cooperation between companies happening now
  • AI’s (Artificial Intelligence’s) Role in Info Sec.
  • The Beginnings of AI and Security
  • Alan Turing Should be a Hero!
  • Learn how Alan Turing cut WW2 by 2 years and saved 20 million lives

Rick and I had a fantastic and varied discussion about the above topics. He not only reports directly to the CEO (rare) but he has serious technical chops as well. He is an avid reader whose interests include various security sub topics. He has some great suggestions on books, movies, etc.

Continue reading

Selfie Based Authentication| Authentication History and the Future

To understand the future let’s take a quick look at the past. Stonewall Jackson (Civil War), China Qin Dynasty Hand Prints 200 BC, Francis Dalton Finger Prints.

Do you want to know pros and cons with various authentication methods of the future? IRIS, Selfie Based Authentication, Voice, Finger Print, Face Recognition, Gesture and other Trends in Mobile Security.

What is the Best Biometric Authentication Methods for Mobile Apps?

Continue reading