Remove How To Remove Libraries Remove Military Remove Retail
article thumbnail

Breaking the Ice on DICE: scaling secure Internet of Things Identities

The Security Ledger

» Related Stories Expert says: Hack your Smart Home to Secure It Fitness apps: Good for your health, not so much for military security Mobile, automation-industry leaders promote two new IoT security efforts. We have those libraries and we’ve wrapped our heads around how that works. Read the whole entry. »

IoT 40
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

We're in our infancy and data is proliferating at a rate that it never has before which should give us greater intelligence as to how to play the game. It's not just going to be Taiwan, they're going to be facing as for example, in this case, you know, the United States has come straight out and said they are our military ally.

article thumbnail

The Hacker Mind Podcast: Going Passwordless

ForAllSecure

For example, here’s Jerry Lewis in a scene from a 1950s film, where he’s trying to break into a Nazi German military base. So by that, I mean, if your developer libraries are available, it's easy to do. How do I register, how to login and how do I represent myself? Lewis: Good. Other: Wait.