Rebecca Mercuri on Computer Forensics
Jan 27, 2010
In this interview, Dr. Mercuri defines computer forensics, then discusses how forensics apply to criminal, civil, and intellectual property law. She addressed the challenges that technological advances, (e.g. RAID, cell phones, GPS devices, and Cloud Computing) increase the challenges faced by the forensic computer scientist. She also discusses appropriate actions if you suspect security issues.
Security for the Services World
Mar 10, 2010
Chris Riley presents security issues threatening service based systems which could be attacked on the transport or the message layer. He examines some of the security threats presenting measures to undertake to reduce the risks and available security frameworks.
Advanced Threat Modeling
Sep 06, 2008
In this presentation, John Steven talks about modeling security threats as a way to discover, understand and counteract threats while designing the system architecture. John presents threat modeling through examples focusing on authentication, authorization and session management.
Department of Homeland Security Weighs in on Threats to Mobile Devices by Martin Monroe Posted on Sep 14, 2013
U.S. Government Program Seeks Alternatives to Passwords by Richard Seroter Posted on Aug 25, 2011 4