Remove 2011 Remove Communications Remove Computer and Electronics Remove Manufacturing
article thumbnail

What is Employee Monitoring? Full Guide to Getting It Right

eSecurity Planet

These can come in a variety of forms we’ll discuss in more detail below, but the most common in a modern office setting is software monitoring, where a piece of software is installed onto employees’ computers, which can then track things such as web activity. The most obvious is performance tracking. In short, the results are mixed.

IT 117
article thumbnail

The Hacker Mind Podcast: Hacking High-Tech Cars

ForAllSecure

A sophisticated set of encryption and electronics is at work inside the vehicle. Vamosi: In my book from 2011 When Gadgets Betray Us , I profiled a young Czech born streetwise car thief, an unlikely example of a high tech criminal. This streetwise criminal realized he could defeat the manufacturers' anti theft software with his own.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

White House Proposes Cybersecurity Legislation

Hunton Privacy

As we reported last week , on May 12, 2011, the Obama administration announced a comprehensive cybersecurity legislative proposal in a letter to Congress. The risk assessment must contain “logging data” for the six months prior to the submission of the risk assessment that contains specified information regarding communications and logs.

article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

Vamosi: Containers are a solution to the problem of how to get software to run reliably when moving it from one computing environment to another. Contains are a standard unit of software that packages code and all its dependencies so the application runs quickly and reliably from one computing environment to another. When I joined.