article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

3D Printing Design & Implementation. In a computing context, the term security implies cybersecurity. Ensuring cybersecurity requires coordinated efforts throughout an information system. The goal of researchers working in pervasive computing is to create smart products that communicate unobtrusively. Internet of Things.

article thumbnail

The Hacker Mind Podcast: Hacking Biology

ForAllSecure

And for me at least information security is just like a more complete version of pewter science, it's like, it's like not only creating things, but figuring out how things work, debugging things breaking things and those same skills can can be applied to any other domain. Green: So there are a lot of information security parallels.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

His approachable style and his desire to teach others what he’s learned about information security has resulted in a massive following of half a million subscribers. Our topic, the same challenge I solved but in 3d Print styles. By anyone’s measure that would make him an infosec influencer, would it not?

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

His approachable style and his desire to teach others what he’s learned about information security has resulted in a massive following of half a million subscribers. Our topic, the same challenge I solved but in 3d Print styles. By anyone’s measure that would make him an infosec influencer, would it not?

Media 52
article thumbnail

The Hacker Mind Podcast: The Hacker Revolution Will Be Televised

ForAllSecure

Could you build this like a 3d model that we think would be really cool to show people like, we just want a board scoreboard. And that was our original task in mind and my co-founder rusty like we went to work with a game company that knew 3D visualization. And so they went from there. That's really neat. And so we were building that?

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

It was a 3D puzzle writ large. And I talk about the need for military brass to better understand computer security if they are going to enact policies that involve computer security. What’s a good entry point for starting CTFs or information security for that matter? No, what hooked me was Myst.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

It was a 3D puzzle writ large. And I talk about the need for military brass to better understand computer security if they are going to enact policies that involve computer security. What’s a good entry point for starting CTFs or information security for that matter? No, what hooked me was Myst.