tac

Employment Law: Trends, Threats, and Tactics in 2014




tac

ETSI unveils its Report comparing worldwide COVID-19 contact-tracing systems – a first step toward interoperability

ETSI unveils its Report comparing worldwide COVID-19 contact-tracing systems – a first step toward interoperability

Sophia Antipolis, 2 February 2021

The COVID-19 pandemic has stretched the planet’s health systems to their limits and tested the measures adopted to alleviate difficulties. Contact tracking or tracing to identify infected people has been one such example. However, contact tracing based on interviews with identified or suspected patients presents known weaknesses from previous pandemics. Turning to digital means in a world where global mobility is the rule was therefore of the essence.

Read More...




tac

ETSI releases the first Group Report on Encrypted Traffic Integration, protecting end users from malicious attacks

ETSI releases the first Group Report on Encrypted Traffic Integration, protecting end users from malicious attacks

Sophia Antipolis, 1 September 2021

ETSI’s Industry Specification Group on Encrypted Traffic Integration (ISG ETI) has concluded the early part of its work, by identifying problems arising from pervasive encrypted traffic in communications networks.

Read More...




tac

ENISA and ETSI joint workshop tackles challenges for European identity proofing

ENISA and ETSI joint workshop tackles challenges for European identity proofing

Sophia Antipolis, 3 May 2022

Today ENISA (the European Union Agency for Cybersecurity) and ETSI organized a workshop as part of their joint effort and collaboration to support EU requirements for identity proofing. The event was mainly addressed at EU companies and other public or academic organizations that run or prepare to launch their remote ID solution.

Read More...




tac

ETSI Secures Critical Infrastructures against Cyber Quantum Attacks with new TETRA Algorithms

ETSI Secures Critical Infrastructures against Cyber Quantum Attacks with new TETRA Algorithms

Sophia Antipolis, 8 November 2022

With the world facing growing challenges including the war in Europe and a global energy crisis, it is essential that the mission- and business-critical communications networks used by the public safety, critical infrastructure and utilities sectors (including transportation, electricity, natural gas and water plants) are secured against third-party attacks, to protect communications and sensitive data. With more than 120 countries using dedicated TETRA (Terrestrial Trunked Radio) networks for these critical services, work has been undertaken to ensure the ETSI TETRA technology standard remains robust in the face of evolving threats.

Read More...




tac

ETSI faced a cyberattack

Sophia Antipolis, 27 September 2023

Following a cyberattack observed on ETSI portal, the IT system dedicated to its members’ work, the ETSI IT team worked in close collaboration with the French National Cybersecurity Agency (ANSSI) to investigate and repair the information systems. The vulnerability on which the attack was based has been fixed.

Read More...




tac

SpotOn London 2012 Storify: Tackling the terabyte: how should research adapt to the era of big data?

Here is a Storify round up of the SpotOn London session: Tackling the terabyte: how should




tac

Attack on Titan. 4, Humanity pushes back! / Hajime Isayama ; [translator, Sheldon Drzka ; lettering, Steve Wands].

"Humanity pushes back! The Survey Corps develops a risky gambit— have Eren in Titan form attempt to repair Wall Rose, reclaiming human territory from the monsters for the first time in a century. But Titan-Eren's self-control is far from perfect, and when he goes on a rampage, not even Armin can stop him! With the survival of humanity on his massive shoulders, will Eren be able to return to his senses, or will he lose himself forever?"-- Page [4] of cover.




tac

After Dead What Came Next in the World of Sookie Stackhouse Charlaine Harris.

Find out what happened after the conclusion of the #1 New York Times bestselling Sookie Stackhouse series. Dead Ever After marked the end of the Sookie Stackhouse series-novels that garnered millions of fans and spawned the hit HBO television show True Blood. It also stoked a hunger that will never die...a hunger to know what happened next. With characters arranged alphabetically-from the Ancient Pythoness to Bethany Zanelli-bestselling author Charlaine Harris takes fans into the future of their favorite residents of Bon Temps and environs. You'll learn how Michele and Jason's marriage fared, what happened to Sookie's cousin Hunter, and whether Tara and JB's twins grew up to be solid citizens. This coda provides the answers to your lingering questions-including details of Sookie's own happily-ever-after...




tac

Diferentes configuraciones de derechos de exportación, la economía Argentina y el sector agropecuario: Simulaciones con el modelo mundial del IFPRI

Este documento es parte de una consultoría del IFPRI con el Banco Mundial para apoyar al gobierno de Argentina, y en particular al Ministerio de Agricultura, Ganadería y Pesca (MAGyP), en el análisis de los derechos o impuestos de exportación (DEXs), llamados también retenciones en la Argentina. Este es un tema con importantes implicaciones políticas, económicas y sociales.




tac

The stories of Edgar Allan Poe / story adaptation by: Stacy King.

The Stories of Edgar Allan Poe is a brilliant collection of some of his best-known stories: The Tell Tale Heart (a murder's haunting guilt), The Cask of Amontillado (a story of brilliant revenge), and The Fall of the House of Usher (an ancient house full of very dark secretes). Also included in this collection are The Mask of the Red Death (horrors of 'the Plague'), and the most famous of all his poems: The Raven (a lover's decline into madness). Best read in a dimly-lit room with the curtains drawn, Poe's brilliant works come to life in darkly thrilling ways in this Manga Classic adaptation.




tac

Tenable Research to Discuss Cloud Security Attack Techniques and Detection Strategies at fwd:cloudsec Europe 2024

Tenable®, the exposure management company, announced today that Shelly Raban, senior cloud security researcher for Tenable, will give a presentation at fwd:cloudsec Europe 2024, taking place on 17 September, 2024 in Brussels, Belgium.

During the session titled, “Who Watches the Watchmen? Stealing Credentials from Policy-as-Code Engines (and Beyond),” Raban will explore techniques adversaries use to exploit modern policy-as-code and Infrastructure-as-code (IaC) domain-specific languages (DSLs), compromise cloud identities and exfiltrate sensitive data. Raban will conclude her presentation by sharing various detection strategies that cyber defenders can implement to detect malicious activity. 

The session will be hosted in the Main Room from 2:50 - 3:10 pm CEST. 

More information on the event is available on the fwd:cloudsec Europe website

More information about Tenable Cloud Security is available at: https://www.tenable.com/products/tenable-cloud-security 

About Tenable

Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com

###

Media Contact:

Tenable

tenablepr@tenable.com




tac

Tenable Selected by Bank of Yokohama to Secure its Active Directory and Eliminate Attack Paths

Tenable®, Inc. the exposure management company, today announced that Bank of Yokohama, one of the largest of the major regional banks in Japan, has chosen Tenable Identity Exposure to protect its Active Directory and enhance the bank’s ability to protect its internal systems from cyber threats.

Bank of Yokohama, based in Kanagawa Prefecture and Tokyo Metropolitan, is committed to enhancing industry security standards. In 2023, it collaborated with 19 other regional banks to establish CMS-CSIRT, an organization providing mutual cybersecurity support. Unlike megabanks, regional banks often face resource and budget constraints, making such collaborative efforts crucial for implementing effective security programs.

As part of its objectives for FY 2023, the Bank of Yokohama wanted to improve Active Directory (AD) security as it’s the most crucial system in the bank’s intranet. Previously, the bank only applied security patches periodically without any tool or system to detect Active Directory misconfigurations or attacks. Given the evolving threat landscape and rise of attacks involving an identity breach, enhancing the security of Active Directory became a top priority.

“Attackers who have infiltrated an organization's internal system or who wield ransomware and other malware, almost always make a beeline for Active Directory,” said Mr. Akihiro Fushimi, Leader, Concordia Financial Group ICT Governance Department, Security Governance Section and Bank of Yokohama ICT Planning & Promotion Department, Security Governance Section. “They steal user account privileges and elevate them via Active Directory, to enable them to access important data. So, securing Active Directory was an area that we wanted to invest in.”

Bank of Yokohama already used Tenable Security Center for vulnerability management and trusted Tenable's reliability. Selecting Tenable Identity Exposure was an easy decision, with its fast, agentless feature ensuring a seamless deployment process.

The deployment of Tenable Identity Exposure provided the Bank of Yokohama with an in-depth view of its Active Directory. The bank can now accurately identify every AD account, including dormant accounts and machine identities, and understand the potential risks of exploitation by malicious actors due to the multi-functional capabilities of Active Directory. Tenable Identity Exposure detects many of the techniques used in cyber attacks to gain elevated privileges and enable lateral movement, including DCShadow, Brute Force, Password Spraying, Golden Ticket and more.

“Previously, we were under the impression that all we needed to do was to apply patches and manage accounts. Now, with the deployment of Tenable Identity Exposure, we are physically able to see the risk of exploitation. This, I believe, is the positive impact of deploying Tenable Identity Exposure. Its alert functions are comprehensive—it detects vulnerabilities as well as misconfigurations,” said Mr. Shinnosuke Shimada, Bank of Yokohama ICT Planning & Promotion Department, Security, Governance Section.

“Many organizations struggle to maintain proper Active Directory security as their domains grow more complex, often leaving flaws undetected until a major incident occurs. Given the high-profile attacks involving AD in recent years, it's crucial to prioritize AD security within the overall cybersecurity strategy,” said Naoya Kishima, Country Manager, Tenable Japan. “Bank of Yokohama recognizes this need, and we're pleased to support them in their security journey.”

About Tenable
Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com

Media contact
Tenable PR
tenablepr@tenable.com 




tac

Tenable Tackles Emerging Cloud and AI Risks With the Launch of Data and AI Security Posture Management for Cloud Environments

Tenable®, the exposure management company, today announced new data security posture management (DSPM) and artificial intelligence security posture management (AI-SPM) capabilities for Tenable Cloud Security, the actionable cloud security solution. By extending exposure management capabilities to cloud data and AI resources, Tenable Cloud Security reduces risk to two of the biggest emerging threats.

Today’s cloud environments are more complex than ever. The challenge of managing this complexity has led to preventable security gaps caused by misconfigurations, risky entitlements and vulnerabilities, leaving sensitive data and AI resources vulnerable. In fact, Tenable Research found that 38% of organizations are battling a toxic cloud trilogy – cloud workloads that are publicly exposed, critically vulnerable and highly privileged. 

Tenable Cloud Security exposes risk from across hybrid and multi-cloud environments, including vulnerabilities, misconfigurations and excess privilege, that affects data and AI resources. Integrating DSPM and AI-SPM into Tenable Cloud Security enables users to automatically discover, classify and analyze sensitive data risk with flexible, agentless scanning. With Tenable Cloud Security’s intuitive user interface, security leaders can easily answer tough questions – such as “What type of data do I have in the cloud and where is it located?,” “What AI resources are vulnerable and how do I remediate the issue?” and “Who has access to my sensitive cloud and AI data?”

“Data is constantly on the move and new uses for data in today’s AI-driven world have created new risks,” said Liat Hayun, vice president of product management for Tenable Cloud Security. “DSPM and AI-SPM capabilities from Tenable Cloud Security bring context into complex risk relationships, so teams can prioritize threats based on the data involved. This gives customers the confidence to unlock the full potential of their data without compromising security.”

“The importance of cloud data has made communicating data exposure risk one of the biggest security challenges for CISOs,” said Philip Bues, senior research manager, Cloud Security at IDC. “Tenable is at the forefront of this emerging DSPM-CNAPP conversation, enabling customers to contextualize and prioritize data risk and communicate it, which is pertinent to almost every domain in CNAPP.”

AI-SPM features enable customers to confidently forge ahead with AI adoption by enforcing AI and machine learning configuration best practices and securing training data. With the combined power of AI-SPM and Tenable Cloud Security’s market-leading cloud infrastructure entitlement management (CIEM) and Cloud Workload Protection (CWP) capabilities, customers can manage AI entitlements, reduce exposure risk of AI resources, and safeguard critical AI and machine learning training data to ensure data integrity. 

Available to all Tenable Cloud Security and Tenable One customers, these new features enable customers to:

  • Gain complete visibility and understanding of cloud and AI data - Tenable Cloud Security continuously monitors multi-cloud environments to discover and classify data types, assign sensitivity levels and prioritize data risk findings in the context of the entire cloud attack surface. 
  • Effectively prioritize and remediate cloud risk - Backed by vulnerability intelligence from Tenable Research, context-driven analytics provides security teams with prioritized and actionable remediation guidance to remediate the most threatening cloud exposures.
  • Proactively identify cloud and AI data exposure - Unique identity and access insights enable security teams to reduce data exposure in multi-cloud environments and AI resources by monitoring how data is being accessed and used and detect anomalous activity. 

Join the upcoming Tenable webinar, “Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?” on October 22, 2024 at 10 am BST and 11 am ET, by registering here

Read today’s blog post, “Harden your cloud security posture by protecting your cloud data and AI resources” here

With a Net Promoter Score of 73, Tenable Cloud Security helps customers around the world expose and close priority threats. More information about DSPM and AI-SPM capabilities available in Tenable Cloud Security is available at: https://www.tenable.com/announcements/dspm-ai-spm

About Tenable

Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for approximately 44,000 customers around the globe. Learn more at tenable.com

###

Media Contact:

Tenable

tenablepr@tenable.com




tac

Red Sea attacks reverberate in food and ag trade (Successful Farming) 

Red Sea attacks reverberate in food and ag trade (Successful Farming) 

Successful Farming quotes the IFPRI blog post on the Impacts of Red Sea shipping disruptions on global food security by senior research fellow Joseph Glauber and senior research analyst Abdullah Mamun.  According to the article, Houthi attacks on cargo ships in the Red Sea are disrupting grain shipments from Europe, Ukraine, and Russia. “Trade disruptions are most likely to impact […]

The post Red Sea attacks reverberate in food and ag trade (Successful Farming)  appeared first on IFPRI.




tac

The timing of the Red Sea attacks could not be worse for Democrats (Politico)

The timing of the Red Sea attacks could not be worse for Democrats (Politico)

Senior research fellow Joseph Glauber is quoted in a Politico story about how the growing military conflict in a key trade corridor is threatening to unleash economic havoc on the global economy ahead of November. “If energy prices go up and remain high, you’d see food inflation persisting,” said Joe Glauber. He added that potential […]

The post The timing of the Red Sea attacks could not be worse for Democrats (Politico) appeared first on IFPRI.




tac

When Luddites Attack (Classic)

A couple centuries ago, a group of English clothworkers set out to destroy the machines that had been taking their jobs. | Subscribe to our weekly newsletter here.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




tac

Tackle your medical debt with Life Kit

There's an estimated $195 billion of medical debt in America. But just because a medical bill comes in the mail doesn't mean you have to pay that exact price. In this special episode from our friends at Life Kit, you'll learn how to eliminate, reduce or negotiate a medical bill.

If you liked this episode, you can check out more Life Kit here. They have episodes on how to choose a bank, and how to save money at the grocery store.

This episode of Life Kit was produced by Sylvie Douglis. Their visuals editor is Beck Harlan, and their digital editor is Danielle Nett. Meghan Keane is their supervising editor, and Beth Donovan is their executive producer.

Help support Planet Money and get bonus episodes by subscribing to Planet Money+
in Apple Podcasts or at plus.npr.org/planetmoney.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




tac

Bonus Episode: Stacey Abrams

The runoff Senate elections in the state of Georgia have been big news, and a driving force behind the scenes for Democrats is Stacey Abrams. She's a lawyer, politician, author, and founder of Fair Fight Action, a voter advocacy group. We featured Stacey Abrams on the program a few months ago, and wanted to share a special bonus cut of her entire interview with Manoush.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




tac

Heartache

When stress, fear or sadness weigh on us, our hearts can suffer — even break. But there are ways to mend our broken hearts. This hour, TED speakers share stories and ideas about soothing heartache. Guests include cardiologist Sandeep Jauhar, law professor Jeannie Suk Gersen, pediatric nurse Hui-wen Sato, and climate activist Knut Ivar Bjørlykhaug.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




tac

Listen Again: Heartache

Original broadcast date: October 1, 2021. When stress, fear or sadness weigh on us, our hearts can suffer — even break. But there are ways to mend our broken hearts. This hour, TED speakers share stories and ideas about soothing heartache. Guests include cardiologist Sandeep Jauhar, law professor Jeannie Suk Gersen, pediatric nurse Hui-wen Sato, and climate activist Knut Ivar Bjørlykhaug. Want to give us feedback? You can take a short, anonymous survey at npr.org/podcastsurvey. Tell us what you like, and how we can improve. Thanks!

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




tac

Heartache

Original broadcast date: October 1, 2021. When stress, fear or sadness weigh on us, our hearts can suffer — even break. But there are ways to mend our broken hearts. This hour, TED speakers share stories and ideas about soothing heartache. Guests include cardiologist Sandeep Jauhar, law professor Jeannie Suk Gersen, pediatric nurse Hui-wen Sato, and climate activist Knut Ivar Bjørlykhaug.

TED Radio Hour+ subscribers now get access to bonus episodes, with more ideas from TED speakers and a behind the scenes look with our producers. A Plus subscription also lets you listen to regular episodes (like this one!) without sponsors. Sign-up at plus.npr.org/ted.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




tac

Engineering students tackle eight problems nagging Toronto communities

Toronto, ON –  First-year students in U of T Engineering are stepping up to take on some of the Greater Toronto Area’s most persistent problems, from diagnosing infant epilepsy to finding lost arrows at a local archery range. This Wednesday, April 12, students at the University of Toronto are hosting a day-long event to showcase […]




tac

“Nudge-a-thon” at University of Toronto’s Rotman School of Management Tackles Public Transit Fare Evasion

Toronto, ON – Fare evaders are a problem faced by public transit systems in cities across the world. Evaders are willing to break the law and risk a significant penalty for the free ride. In Toronto, fare evasion is estimated to cost around $20 million a year in lost revenue. An event at the University […]




tac

The Moth Radio Hour: All About Moms - Babies, Bees, Concerts and Contacts

A special Mother's Day edition of The Moth Radio Hour. A mother helps her daughter get her first contact lenses, an unwanted parental intervention at a school concert, a new mother in Zambia awaits test results, a life or death bee sting and a teenage mother who couldn't be happier to welcome her child to the world. Hosted by The Moth's Artistic Director Catherine Burns. The Moth Radio Hour is produced by The Moth and Jay Allison of Atlantic Public Media.

Storytellers:

Chrissie Graham is a nerdy girl who needs contacts and promptly loses one.

Catherine Palmer tries to micromanage her son at a school concert.

Constance Mudenda is a healthcare worker with a health scare of her own.

Matthew Dicks has an allergic reaction to a bee sting and needs his mother.

Melissa Rodriguez grew up a foster child and then has a child of her own.

Podcast: 434




tac

Hitachi's Industry Executive Greg Kinsey: Black Belts Can (and Should) Drive the Digital Transformation of Manufacturing

Greg Kinsey, Industry Executive at Hitachi, reveals how creative uses of the DMAIC process with digital transformation are helping factories to unlock the next level of process improvement.




tac

New Noncontact Technologies Meet the Challenges of the Evolving Automotive Industry

The transition from ICE to electric powertrain requires a complete review of the approach to quality and process controls. Some existing checks for ICE find even more extensive applications for the EV sector.




tac

Mitutoyo Surface Measure Non-Contact Line-Laser Sensor

Mitutoyo America Corporation announced the release of our innovative SM1008S, the first non-contact line-laser sensor in the Mitutoyo Surface Measure product line.




tac

Hitachi Completes Acquisition of MA micro automation of Germany

MA micro automation will be under operation of JR Automation.
The acquisition expands JR Automation's reach into global automation markets in medical, advanced battery and other fields.




tac

Hard Tack and Mail by G. Harvey Giclee on Canvas Artist Proof

Hard Tack and Mail by G. Harvey Giclee on Canvas Artist Proof by G Harvey is a(n) Limited Edition. The Edition is Limited to Limited Edition Of 50 pcs




tac

Hard Tack and Mail by G. Harvey Giclee on Canvas Signed and Numbered

Hard Tack and Mail by G. Harvey Giclee on Canvas Signed and Numbered by G Harvey is a(n) Limited Edition. The Edition is Limited to Limited Edition Of 195 pcs




tac

Polígonos hiperbólicos regulares convexos y estrellados. Relaciones y representación

The worksheet shows a procedure for the representation in de Poincaré disc of convex and self-intersecting regular hyperbolic polygons.




tac

Polígonos hiperbólicos rectángulos regulares convexos y estrellados. Relaciones y representación

The worksheet shows a procedure for the representation in de Poincaré disc of regular right-angled, convex and star hyperbolic polygons.




tac

CCA In-Flight Adaptation Likely Need for ‘Tactical Responsiveness’

Some defense technologists believe that the U.S. Air Force’s manned Next Generation Air Dominance (NGAD) sixth generation fighter, in order to survive a service-ordered review, will have to be smaller […]




tac

Home Services Veteran Joins SmartAC.com Board

Joshua Kelly will help guide SmartAC.com’s efforts as the company continues to innovate its Smart Agreements and connected home systems technology, a press release from SmartAC.com said.




tac

Direct Supply® PTAC

Quiet Performance: tangential blower wheel with nearly silent 3-speed operation.

Sized to fit wall sleeves of 16"H x 42"W x14"D • 3-year P&L warranty, plus a 5-year limited warranty on sealed system.




tac

Friedrich Tackles HVAC One Room at a Time

Friedrich Air Conditioning Co. is relying on its long history of room-by-room solutions to tackle the latest challenges in HVAC.




tac

JCI-Hitachi Brings Commercial VRF System to North America

The air365 Max with HeatForce heat pump can operate at 100% heating capacity with outdoor temperatures as low as -13°F and at 90% capacity down to -22°F.




tac

How Growth From HVAC Companies Could Put Them at Risk of Ransomware Attacks

As the size – and profits – of these companies continues to grow, they are likely to come under increasing levels of cyberattack.




tac

Conference Tackles Challenges for Food Retailers, HVACR Contractors

Many end users, as well as refrigeration engineers and contractors, attended Food Marketing Institute’s (FMI’s) 2018 Energy & Store Development Conference in Atlanta, looking for advice on how to respond to these trends.




tac

Access Inc. Joins Johnson Controls-Hitachi Manufacturers' Sales Rep Team

Access Inc. will be the new manufacturers' representative for Hitachi VRF systems and SmartFlex™ systems in eastern Michigan and Northwest Ohio




tac

CVE-2024-50386: Apache CloudStack: Directly downloaded templates can be used to abuse KVM-based infrastructure

Posted by Daniel Augusto Veronezi Salvador on Nov 12

Severity: important

Affected versions:

- Apache CloudStack 4.0.0 through 4.18.2.4
- Apache CloudStack 4.19.0.0 through 4.19.1.2

Description:

Account users in Apache CloudStack by default are allowed to register templates to be downloaded directly to the
primary storage for deploying instances. Due to missing validation checks for KVM-compatible templates in CloudStack
4.0.0 through 4.18.2.4 and 4.19.0.0 through 4.19.1.2, an attacker that...




tac

Trane, a brand of Ingersoll Rand: PTAC Units

ProSpace packaged terminal air conditioner (PTAC) quiet comfort systems deliver air comfort and quality to the hospitality industry. 




tac

Controls-Con Tackles Digital Technology and Building Automation

Controls-Con, presented by Cochrane Supply on May 5-7, 2021, discussed the impact of smart controls on the building industry.




tac

Preparing For Emerging Cybersecurity Attacks Against Chillers

When it comes to this piece of critical infrastructure, operators need to be prepared to face new and sophisticated attacks.




tac

SE-Radio-Episode-259:-John-Purrier-on-OpenStack

John Purrier talks with Jeff Meyerson about OpenStack, an open-source cloud operating system for managing compute resources. They explore infrastructure-as-a-service, platform-as-a-service, virtualization, containers, and the future of systems development and management.




tac

SE-Radio Episode 330: Natalie Silvanovich on Attack Surface Reduction

Natalie Silvanovich and Kim Carter discuss reducing the attack surface of the software that Engineers are creating today. Code sharing, third-party code, Developer workflow, and a collection of 0 day bugs are all discussed.




tac

Episode 378: Joshua Davies on Attacking and Securing PKI

Joshua Davies discusses TLS, PKI vulnerabilities in the PKI, and the evolution of the PKI to make it more secure, with host Robert Blumen.




tac

416: Adam Shostack on Threat Modeling

Adam Shostack of Shostack & Associates and author of Threat Modeling: Designing for Security discussed different approaches to threat modeling, the multiple benefits it can provide, and how it can be added to an organization’s existing software proc




tac

Episode 438: Andy Powell on Lessons Learned from a Major Cyber Attack

Andy Powell is the CISO of AP Moller Maersk and discusses the 2017 cyber attack that hit the company and the lessons learned for preventing and recovering from future attacks.