article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

3D Printing Design & Implementation. Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cybersecurity. Internet of Things. Mobile Virtual Enterprise.

article thumbnail

The Hacker Mind Podcast: Hacking Biology

ForAllSecure

I'm Robert Vamosi, and in this episode, I'm talking about how the hacker mindset might directly help us learn more about Computer Aided drug discovery through the use of convolutional neural networks, and machine learning. Green: So there are a lot of information security parallels. Then I've got a story for you.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: The Hacker Revolution Will Be Televised

ForAllSecure

So I started in my career as a network. Network defense guy, I was working at university and had a server get hacked into we're gonna blow report and it was super cool and then ended up getting hired as a security engineer at the university as a student, because I was just like, oh, this is cool. It has a lot of applications.

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

His approachable style and his desire to teach others what he’s learned about information security has resulted in a massive following of half a million subscribers. Our topic, the same challenge I solved but in 3d Print styles. We like to think It's all merit based but as you and I No, it's mostly about networking.

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

His approachable style and his desire to teach others what he’s learned about information security has resulted in a massive following of half a million subscribers. Our topic, the same challenge I solved but in 3d Print styles. We like to think It's all merit based but as you and I No, it's mostly about networking.

Media 52
article thumbnail

Amazon’s Halo tests the limits of personal privacy, and offers a glimpse of the future of health

GeekWire

“Find a well-lit area and try to avoid light from behind,” a voice from the app instructed me as it prepared to conduct a high-tech, 3D body scan. Another feature invited me to strip down to my underwear for a picture. “Change into minimal clothing so the camera can see your body.”.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

It was a 3D puzzle writ large. And I talk about the need for military brass to better understand computer security if they are going to enact policies that involve computer security. What’s a good entry point for starting CTFs or information security for that matter? No, what hooked me was Myst.