article thumbnail

Abagnale Kicks Off 'Vision 2023' Future-Looking Webcast

SecureWorld News

Frank Abagnale, one of the world's most respected authorities on forgery, embezzlement, secure documents, cybercrime, and scams—and subject of the 2002 movie Catch Me If You Can — kicked off Vision 2023: Looking Ahead at Cyber Threats , a half-day educational event held live and recorded on December 13th.

article thumbnail

How Endeavor One used an expert swordsman and dogs to create VR game ‘Arashi: Castles of Sin’

GeekWire

We really strove for authenticity.”. They are fantastically trained, beautiful, disciplined animals, and we got the opportunity to work with them to make sure our experience with Haru is as authentic as humanly possible.”. Doyle has been an artist in the video game industry since 2002.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Pro-Russian LockBit 3.0 Claims Responsibility for Attack on Japan Port

SecureWorld News

The port has remained Japan's largest since 2002. Its suppliers, including Denso Corp., Aisin Corp., and Toyota Industries Corp., have also secured a certain amount of inventory and will only have limited exposure to the system failure, Toyota said. The carmaker is unable to load or unload auto parts due to the system being affected.

article thumbnail

Life goals: Megan Rapinoe says goodbye to soccer, and Seattle tech leaders share how she inspired

GeekWire

Lauren Sato poses high above Lumen Field in 2002 as she is honored as part of the OL Reign’s “Legends Campaign.” ” (Photo courtesy of Lauren Sato) “The way that Megan has led from her values without compromise or apology on and off the field has resonated deeply with me.

Sports 113
article thumbnail

14 essential book recommendations by and for IT leaders

CIO Business Intelligence

It is imperative for technology leaders to be authentic, honest, candid, and transparent — in the pursuit of being trusted.” There must be trust that we are making the right technology decisions, designing and introducing technology that will work and deliver value, and trust in doing what we say we will do.

Devops 130
article thumbnail

Everything You Know About eAuthentication is wrong!

CTOvision

On Labor Day, September 5 th 2016, NIST published their Digital Authentication Guideline: Public Preview. The base document SP 800-63-3 is the third iteration of this special publication, and has been renamed to: Digital Authentication Guideline. SP 800-63B – Authentication & Lifecycle Management. Nathaniel Crocker.

article thumbnail

The Back-to-Basics Readings of 2012 - All Things Distributed

All Things Distributed

Johnson, ACM Computing Surveys (CSUR) Surveys Volume 34 Issue 3, September 2002. Nov 9 - Using Encryption for Authentication in Large Networks of Computers , Roger M. Feb 11 - A Survey of Rollback-Recovery Protocols in Message-Passing Systems , E. Mootaz) Elnozahy , Lorenzo Alvisi , Yi-min Wang , David B. Araújo, K.