Stream

Join this community to post or comment
 
We at Tripwire are very excited that RSA Conference 2015 is finally upon us. Not only are we looking forward to all of the attendees who will join us at Booth 3301 over the course of RSA, but we are also eager to hear all of the keynote speakers. Acknowledging this excitement, we decided to sit down with Steven Fox, one of the conference’s keynote speakers, and explore the ideas that will shape his presentation.

+Tripwire, Inc. 
On Tuesday, April 21st, Fox will present “U.S. vs EU Privacy Cage Match: Adapting to Changing Data Protection Laws” in Room 3012 at RSA.
1
Add a comment...
 
As medical identity theft becomes more prevalent, it’s important to understand how it happens, and what you can do to prevent it.

This white paper is designed to answer some of the most common medical identity theft questions.
Medical identity theft is becoming more prevalent, learn how it happens, and what you can do to prevent it in this extensive white paper.
1
Add a comment...
 
The truth is that cyber security doesn’t have to be expensive when it comes to individual protection, and in the following guide we plan to show you the way to FREE PC security: https://heimdalsecurity.com/blog/13-free-pc-security-hacks-to-build-your-online-protection/
Looking free PC security solutions? We put together a list of resources you can use for free to protect your system against cyber criminals!
1
1
Ꮹ가을동화 (ᏌиequalᏩ)'s profile photo
Add a comment...
 
1 Integration, 1 Platform, Any Form of Biometrics. The Only Identity Platform You’ll Ever Need!

Hybrid Biometric Platform is a multi-modal biometrics system that supports any form of biometrics, including fingerprint, finger vein, palm vein, iris, facial, voice and DNA recognition
Hybrid Biometric Platform is a unique multi-modal biometrics system that supports fingerprint, finger vein, palm vein, and iris recognition with a single integration.
1
Add a comment...
 
Biometrics is the Future of User Authentication

In the world of information technology, the term “biometrics” (also referred to as “biometric authentication”)  is the automated method of recognizing a person based on their unique physiological or behavioral traits. Common examples of human biometric markers are fingerprints, finger and palm veins, iris and facial recognition, even one’s voice print.
1
Add a comment...
 
Hi everyone, I am conducting a questionnaire for my final year project. My project is a research project about how online information is collected and used. If you have 2 minutes to answer a multiple choice questionnaire that would be very appreciated.

https://docs.google.com/forms/d/10fFWQXNoBIJhuc2ORankctq3gR-j0MNFcJMUbRiEzgM/viewform?usp=send_form

The Privacy Implications of The Collection And Use of Data
(All Information gathered will be completely anonymous)
2
Add a comment...
 
Rapid Biometric SDK Integration

Biometric Middleware Enabling Integration into M2SYS Award-Winning Hybrid Biometric Platform™ Multi-Modal Biometrics System
Rapidly integrate a biometric SDK matching system offering fast one-to-many biometric identification that supports many development environments.
1
Add a comment...
 
Biometric Single Sign On SSO Solution

Enterprise Biometrics Suite™ is a biometric single sign on sso solution which relieves the burden of password management while providing a more convenient mechanism for users to access their computer or to the network. The solution seamlessly interfaces with Active Directory, enabling IT personnel to quickly and easily administrate biometric information.
Enterprise secure biometric single sign on SSO and data protection software – fast integration into Active Directory for control and password management.
1
Add a comment...
 
According to a tech consultant, Facebook collects all writing that is entered into a text box and sends it to its servers regardless of whether a user chooses to publish it.

By +David Bisson of +Tripwire, Inc. 
Facebook collects all writing that is entered into a text box and sends it to its servers regardless of whether a user chooses to publish it.
1
Add a comment...
fragrouter Package Description: Fragrouter is a network intrusion detection evasion toolkit. It implements most of the attacks described in the Secure Networks “Insertion, Evasion, and Denial of Service: Eluding Network Intr...
1
Add a comment...
 
Will Biometric Authentication Finally Kill Passwords?

If there is one thing that can significantly increase the safety of your web or Windows experience, it is the elimination of passwords. Every day we hear stories about how network security has been compromised due to password hacks that exposes valuable personal and enterprise data. Let’s face it, passwords are weak and they should be eliminated. The U.S. government has also recognized the issue with passwords and White House Cyber-security Coordinator Michael Daniel said in June that he’s on a mission to “kill the password dead”.
1
Add a comment...
 
A computer espionage gang has sent a rival advanced persistent threat (APT) group a spear phishing email in what might be the first reported instance of an APT-on-APT attack.

By +David Bisson of +Tripwire, Inc. 
A computer espionage gang has sent a rival APT group a spear phishing email in what might be the first reported instance of an APT-on-APT attack.
3
1
David Bisson's profile photo
Add a comment...
 
44 Conferences on Cyber Security that are Worth Attending

We put together a list of some of the most relevant cyber security conferences around the world, so you can use it as a guide to find the right one for you: https://heimdalsecurity.com/blog/44-relevant-cyber-security-conferences-around-the-world/
Looking for a cyber security conference to attend? We know it's difficult to choose, so we made a list of major events so you don't have to.
2
1
Ꮹ가을동화 (ᏌиequalᏩ)'s profile photo
Add a comment...
 
Biometrics as an Alternative to Passwords

In the era of increasing security threats, the use of antiquated passwords, personal identification numbers (PINs), and tokens to protect data and assets leaves businesses susceptible to fraud and theft. Due to the fact that hackers are seemingly running rampant online and millions of users’ identification credentials have been compromised, efforts for stronger identity protection using biometrics are gaining momentum the AFP recently reported.
1
Add a comment...
 
AT&T has agreed to pay a $25 million penalty in a settlement with federal regulators after data breaches in several Latin American call centers exposed the personal information of nearly 280,000 U.S. customers.

+Tripwire, Inc. 
AT&T agreed to pay a $25 million penalty in a settlement with federal regulators after data breaches exposed the personal information of 280,000 customers.
2
Add a comment...
 
Android ‪#‎Hacking‬ Tool ‪#‎FaceNIff‬, You can hack web accounts !
FaceNiff Tool - ‪#‎Android‬ App
http://www.effecthacking.com/2015/04/faceniff-tool-hackers-android-app.html
FaceNiff is an android tool for hackers (newbies) who want to sniff and intercept web session profiles over the WiFi connection. That means, if you want to hack into a Facebook account which is using the same WiFi network, yo...
1
Add a comment...