Remove 12
Remove 2001 Remove 2018 Remove Government Remove Security
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. Hello and welcome to the final IT Governance podcast of 2018. For more information on each story, simply follow the links in the transcript on our blog. Patches were rushed out , but many.

article thumbnail

Identity-based Cryptography

Thales Cloud Protection & Licensing

The first practical IBE scheme was given by Boneh and Franklin [7] in 2001 using bilinear pairing on elliptic curves. The UK government is promoting the MIKEY-SAKKE protocol [16] that implements an identity-based protocol proposed by SAKAI and KASAHARA in 2003. Revocable IBE [12] provides a scalable revocation method.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Extended Validation Certificates are Dead

Troy Hunt

pic.twitter.com/5DpTbsfNNO — Troy Hunt (@troyhunt) May 15, 2018. pic.twitter.com/iFn98lI4Wq — Troy Hunt (@troyhunt) July 27, 2018. link] — Troy Hunt (@troyhunt) August 24, 2018. — Tony Bradley (@RealTonyBradley) August 24, 2018. You know what makes people think the website is "secure"?

Marketing 110
article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

pic.twitter.com/4NK5GAm1z2 — Troy Hunt (@troyhunt) December 24, 2018. Only up to a threshold, that is, and even that changes based on your age but again, there are constructs designed by the government the help everyone maximise the effectiveness of the dollars they earn by minimising the amount of tax payable on them.

Education 111
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Luckily for cybersecurity startups, there’s no shortage of interest in tomorrow’s next big security vendors. Investments in cybersecurity more than doubled from $12 billion to $29.5 How to Land a Round of Funding Securing Data and Infrastructure is Hot. How Do VC Firms Work? Top Cybersecurity Venture Capital Firms.