Podcasts about user authentication

  • 16PODCASTS
  • 17EPISODES
  • 52mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jun 20, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about user authentication

Latest podcast episodes about user authentication

The Treasury Update Podcast
Coffee Break Session #112: What Is Authentication?

The Treasury Update Podcast

Play Episode Listen Later Jun 20, 2024 7:56


In today's podcast, we'll hear from Christin Cifaldi, Director of Product Development & Analytics, discussing authentication in digital systems. What is authentication, and why is it crucial? Tune in to find out.

Flutter Pod - All things Flutter
User Authentication

Flutter Pod - All things Flutter

Play Episode Listen Later Oct 30, 2022 70:47


Your app most likely needs authentication to allow signing in with Apple, Google, Email and so on. We discuss the best way to approach this problem!CONNECT WITH US

CERIAS Security Seminar Podcast
Dipankar Dasgupta, Adaptive Multi-Factor Authentication & Cyber Identity

CERIAS Security Seminar Podcast

Play Episode Listen Later Sep 28, 2022 48:39


Authentication is a critical part to ensure the identity of a legitimate user. During authentication, an individual's credential is validated with a specific computational technique to determine the association of the user with his/her claimed identity. In this talk, I will discuss an adaptive multi-factor authentication (A-MFA) framework which uses adaptive selection of multiple modalities at different operating environment so to make authentication strategy unpredictable to hackers. This methodology incorporates a novel approach of calculating trustworthy values of different authentication factors while the computing device being used under different environmental settings. Accordingly, a subset of authentication factors is determined (at triggering events) on the fly thereby leaving no exploitable a priori pattern or clue for adversaries. Such a methodology of adaptive authentication selection can provide legitimacy to user transactions with an added layer of access protection that is not rely on a fixed set of authentication modalities. Robustness of the system is assured by designing the framework in such a way that if any modality data get compromised, the system can still perform flawlessly using other non-compromised modalities. Scalability can also be achieved by adding new and/or improved modalities with existing set of modalities and integrating the operating/configuration parameters for the added modality.I will highlight what type of evaluation be required for such identity management software to detect possible deep fakes and other forms of faking biometrics. Other attacks on current means of identity validation may become possible. What would be what good figures of merit to be used as response variables? What are good factors over which we would need to test for next-generation identity eco-systems.References:· Advances in User Authentication. Dipankar Dasgupta,Arunava Roy, Abhijit Nag. Publisher: Springer-Verlag, Inc., August 2017.· US Patent #9,912,657: Adaptive Multi-Factor Authentication, Dasgupta, et al., March6, 2018. About the speaker: Dipankar Dasgupta is a Full Professor of Computer Science at the University of Memphis and has been in different faculty positions since 1997. He is at the forefront in applying bio-inspired approaches to cyber defense, served as a program co-chair at the National Cyber Leap Year Summit organized at the request of the White House Office of Science and Technology Directorate (2009). Some of his groundbreaking works, like digital immunity, negative authentication, and cloud insurance model, put his name in Computer World Magazine and other News media.Dr. Dasgupta received external funding from different federal agencies including NSF, DARPA, IARPA, NSA, NAVY, ONR DoD and DHS/FEMA. Dr. Dasgupta has more than 300 publications with about 20,000 citations and having h-index of 62 as per Google scholar. Prof. Dasgupta received the 2014ACM SIGEVO Impact Award, became Fellow of IEEE in 2015, ACM Distinguished Speaker from 2015-2020, and currently IEEE Distinguished Lecturer. In addition to Prof. Dasgupta's research and creative activities, he also spearheads the University of Memphis's education, training and outreach activities on Information Assurance (IA). He is the founding Director of the Center for Information Assurance (CfIA) which is a National Center for Academic Excellence in Information Assurance Education (CAE-IAE) and in Research(CAE-R). Because of the center's wide range of activities, the University of Memphis is in the forefront of information security research, education, and outreach in the state as well as in the region.

CERIAS Security Seminar Podcast
Dipankar Dasgupta, "Adaptive Multi-Factor Authentication & Cyber Identity"

CERIAS Security Seminar Podcast

Play Episode Listen Later Sep 28, 2022


Authentication is a critical part to ensure the identity of a legitimate user. During authentication, an individual's credential is validated with a specific computational technique to determine the association of the user with his/her claimed identity. In this talk, I will discuss an adaptive multi-factor authentication (A-MFA) framework which uses adaptive selection of multiple modalities at different operating environment so to make authentication strategy unpredictable to hackers. This methodology incorporates a novel approach of calculating trustworthy values of different authentication factors while the computing device being used under different environmental settings. Accordingly, a subset of authentication factors is determined (at triggering events) on the fly thereby leaving no exploitable a priori pattern or clue for adversaries. Such a methodology of adaptive authentication selection can provide legitimacy to user transactions with an added layer of access protection that is not rely on a fixed set of authentication modalities. Robustness of the system is assured by designing the framework in such a way that if any modality data get compromised, the system can still perform flawlessly using other non-compromised modalities. Scalability can also be achieved by adding new and/or improved modalities with existing set of modalities and integrating the operating/configuration parameters for the added modality. I will highlight what type of evaluation be required for such identity management software to detect possible deep fakes and other forms of faking biometrics. Other attacks on current means of identity validation may become possible. What would be what good figures of merit to be used as response variables? What are good factors over which we would need to test for next-generation identity eco-systems. References: · Advances in User Authentication. Dipankar Dasgupta,Arunava Roy, Abhijit Nag. Publisher: Springer-Verlag, Inc., August 2017. · US Patent #9,912,657: Adaptive Multi-Factor Authentication, Dasgupta, et al., March6, 2018.

MacBreak Weekly (Audio)
MBW 803: MugBreak Weekly - Apple Q1 Earnings, iOS 15.4, Apple Payment Platform

MacBreak Weekly (Audio)

Play Episode Listen Later Feb 2, 2022 115:26


​Apple Q1 earnings, iOS 15.4, Apple payment platform Apple Reports First Quarter Results Here's everything new in the first betas of iOS 15.4 and iPadOS 15.4 In the Future, AirPods could require User Authentication with Touch or Face ID and other unique Biometric Measures to fully Operate Apple confirms macOS 12.3 deprecates kernel extensions used by Dropbox and Microsoft OneDrive Apple's Head of User Privacy Speaks! Apple celebrates Heart Month with new resources across services Apple spotlights Black voices during Black History Month Apple launches limited-edition Black Unity Braided Solo Loop for Apple Watch, 'Unity Lights' face 'Harry Potter: Wizards Unite' for iOS now officially discontinued Apple to Rival Square by Turning iPhones Into Payment Terminals Picks of the Week Mikah's pick: AcousticSheep SleepPhones Rene's Pick: TimeBolt Andy's Pick: Covert Instruments Genesis lockpick set Alex's Pick: Peak Design Everyday Case Hosts: Mikah Sargent, Alex Lindsay, Rene Ritchie, and Andy Ihnatko Download or subscribe to this show at https://twit.tv/shows/macbreak-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: ZipRecruiter.com/macbreak wealthfront.com/macbreak twit.cachefly.com

All TWiT.tv Shows (MP3)
MacBreak Weekly 803: MugBreak Weekly

All TWiT.tv Shows (MP3)

Play Episode Listen Later Feb 2, 2022 115:26


​Apple Q1 earnings, iOS 15.4, Apple payment platform Apple Reports First Quarter Results Here's everything new in the first betas of iOS 15.4 and iPadOS 15.4 In the Future, AirPods could require User Authentication with Touch or Face ID and other unique Biometric Measures to fully Operate Apple confirms macOS 12.3 deprecates kernel extensions used by Dropbox and Microsoft OneDrive Apple's Head of User Privacy Speaks! Apple celebrates Heart Month with new resources across services Apple spotlights Black voices during Black History Month Apple launches limited-edition Black Unity Braided Solo Loop for Apple Watch, 'Unity Lights' face 'Harry Potter: Wizards Unite' for iOS now officially discontinued Apple to Rival Square by Turning iPhones Into Payment Terminals Picks of the Week Mikah's pick: AcousticSheep SleepPhones Rene's Pick: TimeBolt Andy's Pick: Covert Instruments Genesis lockpick set Alex's Pick: Peak Design Everyday Case Hosts: Mikah Sargent, Alex Lindsay, Rene Ritchie, and Andy Ihnatko Download or subscribe to this show at https://twit.tv/shows/macbreak-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: ZipRecruiter.com/macbreak wealthfront.com/macbreak twit.cachefly.com

MacBreak Weekly (Video HI)
MBW 803: MugBreak Weekly - Apple Q1 Earnings, iOS 15.4, Apple Payment Platform

MacBreak Weekly (Video HI)

Play Episode Listen Later Feb 2, 2022 115:59


​Apple Q1 earnings, iOS 15.4, Apple payment platform Apple Reports First Quarter Results Here's everything new in the first betas of iOS 15.4 and iPadOS 15.4 In the Future, AirPods could require User Authentication with Touch or Face ID and other unique Biometric Measures to fully Operate Apple confirms macOS 12.3 deprecates kernel extensions used by Dropbox and Microsoft OneDrive Apple's Head of User Privacy Speaks! Apple celebrates Heart Month with new resources across services Apple spotlights Black voices during Black History Month Apple launches limited-edition Black Unity Braided Solo Loop for Apple Watch, 'Unity Lights' face 'Harry Potter: Wizards Unite' for iOS now officially discontinued Apple to Rival Square by Turning iPhones Into Payment Terminals Picks of the Week Mikah's pick: AcousticSheep SleepPhones Rene's Pick: TimeBolt Andy's Pick: Covert Instruments Genesis lockpick set Alex's Pick: Peak Design Everyday Case Hosts: Mikah Sargent, Alex Lindsay, Rene Ritchie, and Andy Ihnatko Download or subscribe to this show at https://twit.tv/shows/macbreak-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: ZipRecruiter.com/macbreak wealthfront.com/macbreak twit.cachefly.com

Badasses in Tech
BITCAST 18: EVOLVING USER AUTHENTICATION

Badasses in Tech

Play Episode Listen Later Jul 30, 2020 31:00


evolving bitcast user authentication
Risk Roundup
A Machine Learning Approach to Keystroke Dynamics-Based User Authentication

Risk Roundup

Play Episode Listen Later Mar 10, 2020 47:15


Prof. (Dr.) Sérgio Tenreiro de Magalhães, an Associate Professor and Chair of Cybersecurity at Champlain College Online based in the United States, participates in Risk Roundup to discuss a Machine Learning Approach to Keystroke Dynamics based User Authentication. A Machine Learning Approach to Keystroke Dynamics-Based User Authentication Over the years, nations’ traditional approach to cybersecurity […] The post A Machine Learning Approach to Keystroke Dynamics-Based User Authentication appeared first on Risk Group.

The Tech Blog Writer Podcast
732: Secret Double Octopus Plan to Eliminate Passwords

The Tech Blog Writer Podcast

Play Episode Listen Later Dec 28, 2018 26:36


By 2022, Gartner’s latest report predicts 60% of large and global enterprises, and 90% of midsize enterprises (MSEs), will implement passwordless methods in more than 50% of use cases. In its December 2018 Market Guide for User Authentication, Gartner included Secret Double Octopus as a Representative Vendor in the user authentication category, and for good reason, as they are pioneering the passwordless workplace. Secret Double Octopus is pioneering the password-free workplace. Its high-assurance authentication solutions are built on provably unbreakable cryptography that is highly resistant to attacks and provide a superior user experience. The technology behind the company is based on secret sharing algorithms originally developed to protect nuclear launch codes, the app initiates a multi-layered authentication process for users in order to verify or reject the login attempt, payment, or transaction. Secret Double Octopus is a Business Insider 'Startup that will boom in 2018', PwC game-changer for Global Financial Services Innovation, and recipient of the Frost and Sullivan 'Technology Innovation Award'. Its customer-base includes US, European and Asian companies. I wanted to find out more about their plans and also what if feel like to be included in Gartner's Market Guide for User Authentication two years in a row. I invited Amit Rahav onto my daily tech podcast to find out more.

european asian eliminate frost passwords pwc gartner user authentication secret double octopus
AWS Podcast
#277: November 2018 Update Show

AWS Podcast

Play Episode Listen Later Nov 18, 2018 35:46


Simon takes you through lots of great new features and capabilities for customers, and also a special call out for listeners attending AWS re:Invent to get some AWS Podcast swag! Shownotes with timestamps: 1:42 Compute In the Works – AWS Region in Milan, Italy - AWS News Blog | https://aws.amazon.com/blogs/aws/in-the-works-aws-region-in-milan-italy/ AWS GovCloud (US-East) Now Open - AWS News Blog | https://aws.amazon.com/blogs/aws/aws-govcloud-us-east-now-open/ Amazon EC2 now offers On-Demand Capacity Reservations | https://aws.amazon.com/about-aws/whats-new/2018/10/Amazon-EC2-now-offers-On-Demand-Capacity-Reservations/ Introducing Amazon EC2 Instances Featuring AMD EPYC Processors | https://aws.amazon.com/about-aws/whats-new/2018/11/introducing_amazon_ec2_instances_featuring_amd_epyc_processors/ Amazon ECS-CLI Supports Private Registry Authentication | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-ecs-cli-supports-private-registry-authentication/ Amazon EKS now supports additional VPC CIDR blocks | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-eks-now-supports-additional-vpc-cidr-blocks/ AWS Serverless Application Model Supports Amazon API Gateway Authorizers | https://aws.amazon.com/about-aws/whats-new/2018/10/aws-sam-supports-amazon-api-gateway-authorizers/ 6:04 Cost Management Introducing the New AWS Budgets Console | https://aws.amazon.com/about-aws/whats-new/2018/10/introducing-the-new-aws-budgets-console/ AWS now Supports SEPA Direct Debit Payments in Europe | https://aws.amazon.com/about-aws/whats-new/2018/10/aws-sepa-support/ Amazon API Gateway Announces Tiered Pricing | https://aws.amazon.com/about-aws/whats-new/2018/11/api-gateway-announces-tiered-pricing/ AWS IoT Core Improves the Ability to Ingest Large Amounts of Device Data at a Lower Cost | https://aws.amazon.com/about-aws/whats-new/2018/11/aws-iot-core-improves-ability-to-ingest-large-amounts-of-data/ Access Reserved Instance Purchase Recommendations for All of Your Linked Accounts From a Central Location | https://aws.amazon.com/about-aws/whats-new/2018/11/central-location-for-accessing-ri-purchase-recommendations-for-all-accounts/ Monitor Your Amazon Elasticsearch Reserved Instance Utilization and Coverage Using AWS Budgets | https://aws.amazon.com/about-aws/whats-new/2018/11/monitor-your-amazon-elasticsearch-ri-using-aws-budgets/ Amazon EC2 Spot Console now Provides Access to Spot Savings Information | https://aws.amazon.com/about-aws/whats-new/2018/11/Amazon-EC2-Spot-Console-now-Provides-Access-to-Spot-Savings-Information/ 10:15 Machine Learning Amazon Translate now offers 113 new language pairs | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-translate-now-offers-113-new-language-pairs/ Amazon Polly Adds Italian and Castilian Spanish Voices, and Mexican Spanish Language Support | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-polly-adds-italian-and-castilian-spanish-voices-and-mexican-spanish-language-support/ Amazon Rekognition Announces More Accurate Object and Scene Detection, Can Now Locate Objects in Your Images | https://aws.amazon.com/about-aws/whats-new/2018/11/Amazon-rekognition-announces-more-accurate-object-and-scene-detection-can-now-locate-objects-in-your-images/ Amazon SageMaker Now Supports Pipe Mode for Datasets in CSV Format | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-sagemaker-now-supports-pipe-mode-for-datasets-in-csv-form/ Amazon SageMaker Batch Transform Now Supports AWS KMS Based Encryption | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-sagemaker-batch-transform-now-supports-aws-kms-based-encr/ Now Clone a Hyperparameter Tuning Job through the Amazon SageMaker Console | https://aws.amazon.com/about-aws/whats-new/2018/11/now-clone-a-hyperparameter-tuning-job-through-the-amazon-sagemak0/ Amazon SageMaker Now Supports Apache MXNet 1.3 and TensorFlow 1.11 | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-sagemaker-now-supports-apache-mxnet-1-3-and-tensorflow-1-/ Amazon SageMaker Now Supports Incremental Learning for Image Classification and Object Detection Algorithms | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-sagemaker-now-supports-incremental-learning-for-image-cla/ Amazon SageMaker Batch Transform Now Supports Amazon Virtual Private Cloud | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-sagemaker-batch-transform-now-supports-amazon-virtual-pri/ Now Use Chainer 5.0 on AWS Deep Learning AMIs | https://aws.amazon.com/about-aws/whats-new/2018/11/chainer5-0_launch_deep_learning_ami/ Introducing Machine Learning for Telecommunication | https://aws.amazon.com/about-aws/whats-new/2018/11/introducing-machine-learning-for-telecommunication/ 15:14 Storage Amazon EFS now Supports AWS VPN and Inter-Region VPC Peering | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-efs-now-supports-aws-vpn-and-inter-region-vpc-peering/ Amazon Elastic File System Now Supports 512 Locks per File | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-elastic-file-system-now-supports-512-locks-per-file/ Amazon S3 Management Console is Now Available in Five New Languages | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-s3-console-is-now-available-in-five-new-languages/ Amazon Data Lifecycle Manager adds support for copying EBS volume tags to EBS snapshots | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-data-lifecycle-manager-adds-support-for-copying-ebs-volume-tags-to-ebs-snapshots/ 16:23 Networking Announcing the general availability of Bring Your Own IP for Amazon Virtual Private Cloud | https://aws.amazon.com/about-aws/whats-new/2018/10/announcing-the-general-availability-of-bring-your-own-ip-for-amazon-virtual-private-cloud/ Amazon API Gateway Launches the Serverless Developer Portal | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-api-gateway-launches-the-serverless-developer-portal/ Amazon API Gateway Adds Support for AWS WAF | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-api-gateway-adds-support-for-aws-waf/ Amazon CloudFront announces six new Edge locations across North America, Europe, and Asia | https://aws.amazon.com/about-aws/whats-new/2018/11/cloudfront-nov6-launch/ Amazon Route 53 Releases Interactive Map for Traffic Flow Geoproximity Routing | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-route-53-releases-interactive-map-for-traffic-flow-geoproximity-routing/ 19:17 Databases Amazon ElastiCache Now Supports the Next Generation General-Purpose and Memory-Optimized Amazon EC2 M5 and R5 Nodes | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon_elasticache_now_supports_the_next_generation_general-purpose_and_memory-optimized_amazon_ec2_m5_and_r5_nodes/ New – Redis 5.0 Compatibility for Amazon ElastiCache - AWS News Blog | https://aws.amazon.com/blogs/aws/new-redis-5-0-compatibility-for-amazon-elasticache/ Amazon RDS Enables Stopping and Starting of Multi-AZ Database Instances | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-rds-stop-and-start-of-multi-az-instances/ Amazon RDS for MySQL,MariaDB and PostgreSQL Now Supports Database Storage Size up to 32TiB | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-rds-mysql-mariadb-postgresql-32tib-support/ Amazon RDS now supports MySQL 8.0 | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-rds-now-supports-mysql-8/ Amazon RDS now supports MariaDB 10.3 | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-rds-now-supports-mariadb-10_3/ PostgreSQL 11 is Now Available in Amazon RDS Database Preview Environment | https://aws.amazon.com/about-aws/whats-new/2018/10/postgresql-11-available-in-rds-database-preview/ Amazon RDS for SQL Server Enhances Backup and Restore Capabilities | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-rds-for-sql-server-enhances-backup-and-restore-capabilities/ Amazon RDS for Oracle Now Supports M5 Instance Types | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-rds-for-oracle-supports-m5-instances/ Amazon RDS Performance Insights is Generally Available on RDS for Oracle | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-rds-performance-insights-is-generally-available-on-rds-for-oracle/ Amazon RDS for Oracle Now Supports Oracle Java | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-rds-for-oracle-now-supports-oracle-java/ Amazon RDS for Oracle Now Supports Extended Data Types | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-rds-for-oracle-now-supports-extended-data-types/ Amazon RDS Now Sends Events to Amazon CloudWatch Events | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-rds-now-sends-events-to-amazon-cloudwatch-events/ Amazon RDS for SQL Server Now Supports Always On Availability Groups | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-rds-for-sql-server-now-supports-alwayson-availability-groups/ Amazon Aurora with PostgreSQL Compatibility Supports IAM Authentication | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-aurora-postgresql-supports-iam-authentication/ 24:37 Management Tools New – CloudFormation Drift Detection - AWS News Blog | https://aws.amazon.com/blogs/aws/new-cloudformation-drift-detection/ New AWS CloudFormation Management Console Now Available | https://aws.amazon.com/about-aws/whats-new/2018/11/new-aws-cloudformation-management-console-now-available/ AWS CloudFormation coverage updates for Amazon Secrets Manager, Amazon API Gateway, Amazon RDS, Amazon Route53, Amazon Cloudwatch alarms and more | https://aws.amazon.com/about-aws/whats-new/2018/11/aws-cloudformation-coverage-updates-for-amazon-secrets-manager--/ Introducing AWS CloudFormation support for Amazon Data Lifecycle Manager policies | https://aws.amazon.com/about-aws/whats-new/2018/11/introducing-aws-cloudformation-support-for-amazon-data-lifecycle-manager-policies/ New Quick Start builds a CI/CD pipeline to test AWS CloudFormation templates using AWS TaskCat | https://aws.amazon.com/about-aws/whats-new/2018/10/new-quickstart-builds-cicd-pipeline-to-test-cloudformation-templates-using-taskcat/ Amazon CloudWatch Events Adds the Ability to Share Events Across All Accounts in an Organization | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-cloudwatch-events-adds-the-ability-to-share-events-across-all-accounts-in-an-organization/ Easily Monitor Security Events of Your AWS Managed Microsoft AD Using Amazon CloudWatch Logs | https://aws.amazon.com/about-aws/whats-new/2018/10/easily-monitor-security-events-of-your-aws-managed-microsoft-ad-using-amazon-cloudwatch-logs/ 27:41 Business Productivity Amazon WorkDocs Now Lets You Control IP Address Access to Your Site | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-workdocs-control-ip-address-access/ Alexa for Business now enables third party device makers to have their products be managed as shared devices | https://aws.amazon.com/about-aws/whats-new/2018/10/alexa-for-business-now-enables-third-party-device-makers-to-have/ Introducing Amazon AppStream 2.0 AWS CloudFormation Support and User Pool APIs | https://aws.amazon.com/about-aws/whats-new/2018/10/introducing-amazon-appstream-2-0-aws-cloudformation-support-and-/ Amazon WorkDocs Drive Now Available for Mac | https://aws.amazon.com/about-aws/whats-new/2018/10/amazon-workdocs-drive-available-for-mac/ 28:30 Security AWS Firewall Manager Now Supports Multiple AWS WAF Rule Groups | https://aws.amazon.com/about-aws/whats-new/2018/10/firewall-manager-now-supports-multiple-aws-waf-rulegroups-per-policy/ AWS Single Sign-On Now Enables You to Optimize How Long You can Access AWS Accounts | https://aws.amazon.com/about-aws/whats-new/2018/10/aws-single-sign-on-now-enables-you-to-optimize-how-long-you-can-access-aws-accounts/ AWS Single Sign-On Adds More Pre-Integrated Business Applications | https://aws.amazon.com/about-aws/whats-new/2018/11/aws-single-sign-on-adds-more-pre-integrated-business-applications/ Amazon GuardDuty Optimizes AWS CloudTrail Analysis Reducing Cost for Customers | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-guardduty-optimizes-aws-cloudtrail-analysis-reducing-cost-for-customers/ Amazon Inspector Launches Agentless Network Assessments | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-inspector-launches-agentless-network-assessments/ Amazon Inspector Adds Amazon EC2 Instance Details to Security Findings | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-inspector-adds-amazon-ec2-instance-details-to-security-findings/ Centralized Logging Now Leverages Amazon Cognito for User Authentication | https://aws.amazon.com/about-aws/whats-new/2018/11/centralized-logging-now-leverages-amazon-cognito-for-user-authentication/ AWS Key Management Service Has a New Console Experience | https://aws.amazon.com/about-aws/whats-new/2018/11/aws-key-management-service-has-a-new-console-experience/ 32:13 Analytics Amazon QuickSight adds support for Top N Filters, Cascading Parameter Controls, and JSON Parsing | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-quickSight-now-supports-top-bottom-filters-cascading-parameter-controls-and-json-parsing-on-data-sources/ Amazon EMR now supports a public EMR artifact repository for Maven builds | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-emr-now-supports-a-public-EMR-artifact-repository-for-maven-builds/ Amazon EMR now supports G3, H1, and Z1d instances | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-emr-now-supports-g3-h1-z1d-instances/ Support for Flink 1.6.0, Zeppelin 0.8.0, and S3 Select with Hive and Presto on Amazon EMR release 5.18.0 | https://aws.amazon.com/about-aws/whats-new/2018/11/support-for-flink-160-zeppelin-080-and-s3-select-with-hive-and-presto-on-amazon-emr-release-5180/ Stream data from Microsoft Windows based services using the Amazon Kinesis Agent for Microsoft Windows | https://aws.amazon.com/about-aws/whats-new/2018/11/stream-data-from-microsoft-windows-based-services-using-the-amazon-kinesis-agent-for-microsoft-windows/ 33:36 Customer Engagement Amazon Pinpoint announces support for transactional emails and the addition of rich email analytics dashboards | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-pinpoint-announces-support-for-transactional-emails-and-t/ 34:33 Application Integration Amazon SQS FIFO Queues Now Available in Asia Pacific (Tokyo) and Asia Pacific (Sydney) Regions - Amazon Web Services | https://aws.amazon.com/about-aws/whats-new/2018/11/amazon-sqs-fifo-asia-pacific-tokyo-sydney/

Motive Insights - the podcast
028 - Paul Anderson, real-time user authentication with AI and machine learning

Motive Insights - the podcast

Play Episode Listen Later Aug 15, 2018 17:43


Paul Anderson, Head of Strategic Alliances at Callsign, on the exciting developments in real-time user authentication and identity management through behavioral patterns, and thanks to artificial intelligence and machine learning.---The information contained in this podcast is intended for discussion purposes only. It is not a recommendation, offer, or a solicitation for the purchase or sale of a security or any services of Motive Partners. All investing involves risk and there is no guarantee that past performance will be indicative of future results.The views and opinions expressed in the podcast are as of the date of recording, reflect the views and opinions of the persons expressing them, and do not necessarily represent the views or opinions of Motive Partners. Motive Partners makes no representations or warranties as to the accuracy, reliability or completeness of any information provided and undertakes no obligation to update, amend, or clarify the information in the podcast, whether as a result of new information, future events, or otherwise. Any securities, transactions, or holdings discussed may not represent investments made by Motive Partners. It should not be assumed that securities, transactions, or holdings discussed (if any) were or will be profitable, or that the recommendations or decisions made in the future will be similar or will equal the performance of the securities, transactions, or holdings discussed herein.This podcast may contain forward-looking statements that are based on beliefs, assumptions, current expectations, estimates, and projections about the financial industry, the economy, Motive Partners or Motive Partners' investments. Nothing in the podcast should be construed or relied upon as investment, legal, accounting, tax or other professional advice or in connection with any offer or sale of securities.

Cybersecurity Sense
Cloud Storage and User Authentication Compromises: Managing the Integrity of Your Data

Cybersecurity Sense

Play Episode Listen Later Nov 27, 2017 15:46


Often in the information security industry, professionals can be accused of spreading fear, uncertainty, and doubt with cybersecurity concerns. However, considering the implications of integrity attacks, it is essential to pay close attention to them. As more organizations move to cloud storage, user authentication compromises are increasing. If an organization has sensitive information that can be accessed from anywhere online by simply using a username and password, that information is at risk, and organizations should make an effort to make their networks more secure.   In this podcast, LBMC Information Security’s Jason Riddle and Mark Fulford discuss the growing concerns with data integrity and how to avoid being a victim of attacks.   Listen, and discover these key takeaways: Feedback heard from the cybersecurity field The need for two-factor or multi-factor authentication The ability for integrity attacks to impact financial markets How integrity attacks could be more effective than availability attacks and confidentiality attacks The need to increase cybersecurity efforts to prevent integrity risks and attacks

Securit13 Podcast
Эпизод 82 - Oleksii and Conferences (11.5.2017)

Securit13 Podcast

Play Episode Listen Later Jul 19, 2017 51:26


Intro / Outro I Do Believe I've Had Enough by Zephaniah And The 18 Wheelers http://freemusicarchive.org/music/Zephaniah_And_The_18_Wheelers/Live_On_WFMUs_Honky_Tonk_Radio_Girl_Program_with_Becky_11316/Zephaniah_And_The_18_Wheelers_02_I_Do_Believe_Ive_Had_Enough Big 4 of the top security and privacy conferences: S&P ("Oakland"), NDSS, CCS and USENIX Security. Наука не делается самостоятельно, a нужно учиться у передовых исследований, как они интегрируются с практикой, понимать их уровень, и себя показывать. По-этому, для того кто первый с украинским affiliation опубликует статью на этих конференциях - с меня можно пообещать "коньяк" :) The Network and Distributed System Security Symposium (NDSS) 2017 by Internet Society - http://www.internetsociety.org/events/ndss-symposium/ndss-symposium-2017 > From the keynote speech by J. Alex Halderman: "Want to Know if the Election was Hacked? Look at the Ballots" - https://medium.com/@jhalderm/want-to-know-if-the-election-was-hacked-look-at-the-ballots-c61a6113b0ba "Securing Digital Democracy" course - https://www.coursera.org/learn/digital-democracy Video - https://www.youtube.com/watch?v=Snoo6CXiyWU&feature=youtu.be > Web Security section: "(Cross-)Browser Fingerprinting via OS and Hardware Level Features" by Yinzhi Cao et al. - https://www.internetsociety.org/doc/cross-browser-fingerprinting-os-and-hardware-level-features Websites to test your browser and device fingerprint: https://panopticlick.eff.org https://amiunique.org http://uniquemachine.org (now, cross-browser!) "Fake Co-visitation Injection Attacks to Recommender Systems" by Guolei Yang et al. - https://www.internetsociety.org/doc/fake-co-visitation-injection-attacks-recommender-systems > User Authentication section: "Cracking Android Pattern Lock in Five Attempts" by Guixin Ye at el. - https://www.internetsociety.org/doc/cracking-android-pattern-lock-five-attempts "Towards Implicit Visual Memory-Based Authentication" by  - https://www.internetsociety.org/doc/towards-implicit-visual-memory-based-authentication > TLS et al. (several papers on Diffie-Hellman and more) "The Security Impact of HTTPS Interception" by Zakir Durumeric et al. - https://www.internetsociety.org/doc/security-impact-https-interception "WireGuard: Next Generation Kernel Network Tunnel" by Claude Castelluccia et al. - https://www.internetsociety.org/doc/wireguard-next-generation-kernel-network-tunnel  (by a single author, Jason Donenfeld!) More on WireGuard: https://fosdem.org/2017/schedule/event/wireguard/ https://www.phoronix.com/scan.php?page=news_item&px=WireGuard-2016 https://www.wireguard.io > On Tor: "The Effect of DNS on Tor's Anonymity" by Benjamin Greschbach et al. - https://www.internetsociety.org/doc/e-effect-dns-tors-anonymity "Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection" by Aaron Johnson et al.  - https://www.internetsociety.org/doc/avoding-man-wire-improving-tors-security-trust-aware-path-selection  (more on proper path selection for Tor, possible attacks on Astoria). > Malware: "Dial One for Scam: A Large-Scale Analysis of Technical Support Scams" - наша статья, получившая Distinguished Paper Award! https://www.internetsociety.org/doc/dial-one-scam-large-scale-analysis-technical-support-scams "MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models" by Enrico Mariconti et al. - https://www.internetsociety.org/doc/mamadroid-detecting-android-malware-building-markov-chains-behavioral-models "A Broad View of the Ecosystem of Socially Engineered Exploit Documents" by Stevens Le Blond et al. - https://www.internetsociety.org/doc/broad-view-ecosystem-socially-engineered-exploit-document s (можно проводить много интересных исследований на базе данных из VirusTotal). ... and much more interesting works on SGX, virtualization, and binary reassembly, etc. Plus, a DNS Privacy Workshop program - https://www.internetsociety.org/events/ndss-symposium/ndss-symposium-2017/dns-privacy-workshop-2017-programme

Computer Systems Security
Lecture 17: User Authentication

Computer Systems Security

Play Episode Listen Later Mar 28, 2017 79:48


In this lecture, Professor Mickens discusses authentication schemes and their implementations.

lecture user authentication
MOSTLY MONEY with Preet Banerjee
47: How your heart rhythm will replace all your passwords

MOSTLY MONEY with Preet Banerjee

Play Episode Listen Later May 4, 2016 40:31


Karl Martin is the founder of Nymi, Inc., a company who wants to disrupt the field of "user authentication". In other words, how do you prove "you are you" to a machine? By using a simple password? Do you use the same one for everything? What if you could replace the need for passwords altogether and increase security? That's the goal of the Nymi Band. There are countless applications, including financial transactions at POS terminals as well as for online shopping. Not so good for action movie plot devices, though.

GoRails Screencasts
User Authentication with Devise

GoRails Screencasts

Play Episode Listen Later Jul 7, 2014 19:05