article thumbnail

The Hacker Mind Podcast: Hacking Biology

ForAllSecure

And for me at least information security is just like a more complete version of pewter science, it's like, it's like not only creating things, but figuring out how things work, debugging things breaking things and those same skills can can be applied to any other domain. Green: So there are a lot of information security parallels.

article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

3D Printing Design & Implementation. In a computing context, the term security implies cybersecurity. Ensuring cybersecurity requires coordinated efforts throughout an information system. The goal of researchers working in pervasive computing is to create smart products that communicate unobtrusively. Internet of Things.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: The Hacker Revolution Will Be Televised

ForAllSecure

Could you build this like a 3d model that we think would be really cool to show people like, we just want a board scoreboard. And that was our original task in mind and my co-founder rusty like we went to work with a game company that knew 3D visualization. And so they went from there. That's really neat. And so we were building that?

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

His approachable style and his desire to teach others what he’s learned about information security has resulted in a massive following of half a million subscribers. Our topic, the same challenge I solved but in 3d Print styles. By anyone’s measure that would make him an infosec influencer, would it not?

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

His approachable style and his desire to teach others what he’s learned about information security has resulted in a massive following of half a million subscribers. Our topic, the same challenge I solved but in 3d Print styles. By anyone’s measure that would make him an infosec influencer, would it not?

Media 52
article thumbnail

Amazon’s Halo tests the limits of personal privacy, and offers a glimpse of the future of health

GeekWire

“Find a well-lit area and try to avoid light from behind,” a voice from the app instructed me as it prepared to conduct a high-tech, 3D body scan. Another feature invited me to strip down to my underwear for a picture. “Change into minimal clothing so the camera can see your body.”.

article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. Literally, how the rebellion fighting the Empire has echoes in how we approach and mitigate information security threats. But in information security, it's not always true.