article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

3D Printing Design & Implementation. Agile Software Development. Today’s top trend with software development leaders is continuous development. Virtualizing – Virtualized infrastructure is an enormously important component in a successful software development organization. Internet of Things.

article thumbnail

The Hacker Mind Podcast: The Hacker Revolution Will Be Televised

ForAllSecure

WIENS : Yeah, so people when they asked me what I do, I say I build software that takes apart other pieces of software. So the idea is that for a variety of purposes, a company might want to understand is this piece of software, a virus or someone else might want to say, is this piece of software that I'm going to run on my computer?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Hacking Biology

ForAllSecure

And for me at least information security is just like a more complete version of pewter science, it's like, it's like not only creating things, but figuring out how things work, debugging things breaking things and those same skills can can be applied to any other domain. Green: So there are a lot of information security parallels.

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

His approachable style and his desire to teach others what he’s learned about information security has resulted in a massive following of half a million subscribers. Our topic, the same challenge I solved but in 3d Print styles. By anyone’s measure that would make him an infosec influencer, would it not?

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

His approachable style and his desire to teach others what he’s learned about information security has resulted in a massive following of half a million subscribers. Our topic, the same challenge I solved but in 3d Print styles. By anyone’s measure that would make him an infosec influencer, would it not?

Media 52
article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

that uses both Star Wars and STRIDE to help engineers under vulnerabilities and threats in software development. Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. But in information security, it's not always true.

article thumbnail

7 key questions CIOs need to answer before committing to generative AI

CIO Business Intelligence

“We take a photo of your teeth with your phone and we generate a 3D model representation and we can project with AI what a straightening plan would look like, how long it would take, and what it would look like when we’re done.” There aren’t a lot of distinguishing marks, so getting an accurate 3D model from your phone is a difficult task.”