This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Under the proposed settlement, MoviePass, its parent company Helios and Matheson Analytics, its CEO Mitch Lowe, and chairman Ted Farnsworth are forbidden from falsely representing their business and data security practices to customers. The company offered users one movie ticket a day to any film at any theater for less than $10 a month.
If you look around, you’ll see we’re not fighting off human replicas as Harrison Ford did in the 1982 film Blade Runner , which was set in the futuristic time period of 2019. As an informationsecurity professional, I’m often asked, “What can I do to make my company safe from cyber threats?”
InformationSecurity is no different. Hedy Lamarr: Hollywood Star and Secret Inventor Hedy Lamarr was a glamorous actress who starred in films of the 1940s and '50s. Throughout history, many people have worked behind the scenes to help humanity reach its potential.
Yet, no one has thought to mandate safety and security standards for the information systems of even our largest public corporations. Criteria might include such things as double authentication, end point security, heuristic malware detection technology etc. Political Manipulation. The federal government ought to do so.
While I was doing that, I wrote my first book on IOT security. I also got my CISSP certification, because I wanted to show people that even though I started as a journalist, I actually understand informationsecurity. I am featured in a documentary film on the history of hacking called Code 2600.
I did get a film degree in college, along with an English degree, but after college, well, knowing how the sausage was made, I wasn’t keen on going to Hollywood. What if you are a woman in informationsecurity? When I was a kid, I really wanted to direct motion pictures. I went to San Francisco. And the good news?
I’m Robert Vamosi and this episode about best practices in informationsecurity, and how critical life services, in particular, remain at risk today -- in the middle of a global pandemic. From a 1953 health class film, here are some basic tips to avoid spreading the measles. Vamosi: He’s right.
I’m Robert Vamosi and this episode about best practices in informationsecurity, and how critical life services, in particular, remain at risk today -- in the middle of a global pandemic. From a 1953 health class film, here are some basic tips to avoid spreading the measles. Vamosi: He’s right.
But it wasn’t until I was watching Britney Runs A Marathon, a critically acclaimed 2019 film, that it occurred to me that people who don’t run 5Ks, 10Ks or full-on marathons are under the mistaken impression that I might be running to WIN the race. Vamosi: Like a lot of you, I run marathons. Thirteen by my last count.
Having a common framework around vulnerabilities, around threats , helps us understand the informationsecurity landscape better. Literally, how the rebellion fighting the Empire has echoes in how we approach and mitigate informationsecurity threats. It’s called the Death Star Architect Speaks Out.
vassal him Chuck is the electric control center manager and told us when hackers took over their computers, all his workers could do was film it with their cell phones. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. It was illogical and chaotic.
I studied English and Film Making in college; I did not get a traditional CS degree. Then again, you might want someone --anyone -- to come in as a Level 1 security analyst so your current Level 1s can advance. But how do you even start to identify who might be good in a role in informationsecurity?
I’m Robert Vamosi and in this episode I’m talking about our right to repair, how some high tech companies might want to limit that right, and how there’s a group of informationsecurity professionals who are volunteering their free time to fight for those rights in local legislation.
I’m Robert Vamosi and in this episode I’m talking about our right to repair, how some high tech companies might want to limit that right, and how there’s a group of informationsecurity professionals who are volunteering their free time to fight for those rights in local legislation.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content