article thumbnail

Primer: The next act for security theater

The Parallax

The day after DefCon concluded this year, a prominent cybersecurity researcher and hacker known as the brain behind hacks featured on hit TV show Mr. Robot offered his resignation as the head of its security operations. Why are Androids less secure than iPhones? We MUST NOT let our hotels become like our airports.

Hotels 189
article thumbnail

China’s draft measures demand ‘individual approval’ for facial recognition use

TechCrunch

The move is building upon the implementation of major tech regulations that rolled out in recent years targeting cybersecurity , data security , and privacy protection. China has seen several major biometric data breaches in recent years, compromising the sensitive information of millions of people.

Hotels 200
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

RSAC Day Two – Highlights from Social Media

Palo Alto Networks

We ended the day over at the Virgin Hotel rocking out with Sheryl Crow at the Palo Alto Networks Experience. Here are the highlights from the day’s social media coverage: The #PANexperienceRSA rocks on with Sheryl Crow. High energy today at the cybersecurity leader’s booth!

Media 52
article thumbnail

Guide to Digitizing Hotel Upselling and Cross-Selling: Strategies and Tools

Altexsoft

Upselling and cross-selling provide hotel owners and managers with the ability to drive greater profit from the same guest by timely offering valuable services. This post aims at explaining the key hotel upselling and cross-selling strategies, ways to digitize them effectively, and examples of existing software serving that purpose.

Hotels 59
article thumbnail

RSAC Day Three – Highlights from Social Media

Palo Alto Networks

We wrapped up back at the Virgin Hotel, where digital forensics expert Hany Farid informed customers and partners about the groundbreaking AI systems being used to tackle the fast-emerging threat of deepfakes. Here are the highlights from the day’s social media coverage: .

Media 52
article thumbnail

From Solar Sunrise to Solar Winds: The Questionable Value of Two Decades of Cybersecurity Advice

Haft of the Spear

While the Ware Report of 1970 codified the foundations of the computer security discipline, it was the President’s Commission on Critical Infrastructure Protection report of 1997 that expanded those requirements into recommendations for both discrete entities as well as the nascent communities that were growing in and around the Internet.

Security 102
article thumbnail

CIOs Have To Treat Social Media With Care

The Accidental Successful CIO

Hackers can learn a lot from a CIO’s social media Image Credit: Blogtrepreneur Every person with the CIO job knows what social media is. In fact, we all probably have Facebook, LinkedIn, and other social media accounts. However, it turns out that there is a downside to social media that we may not be aware of.

Media 52