Blogs do autor

Smart Hospitals Need to be Secured
Autor: Rosenquist, Matthew L Publicado em 02/12/16 0
I want my hospital to be smart, but I demand it be secure and safe!  A new report from the European Union Agency for Network and Information Security (ENISA) outlines strong recommendations for hospitals to protect themselves from cyber risks as they embrace new technology. The Best Care Pos...
Intel® Software Innovators Summit Collaboration Challenge
Autor: Warner, Elizabeth Publicado em 02/12/16 0
The second annual Intel® Software Innovator Summit was held in Seattle, Washington in November 2016. 50 Innovators from North America, South America, and Europe attended the event and this year we included a team collaboration mini-hackathon challenge. The basis of the challenge was to deliver ...
Intel® Software Innovator Summit 2016
Autor: Warner, Elizabeth Publicado em 02/12/16 0
The second annual Intel® Software Innovator Summit was hosted at the Edgewater Hotel in Seattle, beautifully located right on the bay. 50 innovators from North America, South America, and Europe arrived throughout the day with free time to explore the city or to relax and connect with others in...
Cybercriminals Next Targets: Long Term Prizes (part 2 of 2)
Autor: Rosenquist, Matthew L Publicado em 01/12/16 0
In the previous blog, Cybercriminals Next Targets: Short Term Dangers (part 1 of 2), I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging Internet-of-Things (IoT) devices.  The longer-term outlo...
Presence, Reality, and the Art of Astonishment in Arizona Sunshine
Autor: Gardner, Robert Publicado em 01/12/16 0
What is presence, why does it matter to VR, and how did Intel and Vertigo Games improve it in Arizona Sunshine?
Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)
Autor: Rosenquist, Matthew L Publicado em 01/12/16 0
Where Cybercriminals Will Go Knowing what cybercriminals are targeting today is easy.  Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a glassware shop.  The tougher challenge is figuring out where they will take aim tomorrow.  Knowing where cyber t...
Interview with Well Told Entertainment about their Virtual Reality Escape Room Game
Autor: Warner, Elizabeth Publicado em 30/11/16 0
You light a few candles, turn off the lights, and say Bloody Mary’s name 3 times in to the mirror… can you get past your terror and solve a series of puzzles to escape the room before Mary can get through? Just in time for Halloween, Well Told Entertainment has launch their first game, Escape Blo...
Farewell SHA-1 Hash Algorithm
Autor: Rosenquist, Matthew L Publicado em 29/11/16 1
Rest-in-Peace SHA-1.  Like all security controls, they are only valuable for a certain period of time. SHA-1, a legacy hashing algorithm once used heavily in secure web browsing, has outlived its usefulness, therefore it is time to be permanently retired.  Microsoft, Mozilla, and Google just ...
What is the Intel® Software Innovator Program? A Quick Look
Autor: Warner, Elizabeth Publicado em 29/11/16 0
Intel® Software Innovator Program Did you know that Intel® offers a program specifically designed to support independent developers in using the latest technology and open source software to bring their ideas to life? Intel created this program in order to build relationships with software devel...
SVG Images are a New Ransomware Threat
Autor: Rosenquist, Matthew L Publicado em 29/11/16 0
Creative cyber criminals are taking advantage of Facebook's compatibility with SVG images to infect victims with ransomware. SVG (Scalable Vector Graphics) files are dangerous on social media sites, in email, and even instant messaging tools, as this format is designed with the ability to conta...