Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Life Inside a Skinner Box 3: Breakdown of Automated Law Enforcement

Woody Hartzog and Lisa Shay now break down the automated law enforcement process into individual constituents and analyze each one in detail. Woody Hartzog: So, how does the law become involved in all of this? Greg just talked about how the technology is in place. The sensors are there to record our...

Life Inside a Skinner Box 2: Existing Technology and Successful Prototypes

In this part Greg Conti provides unambiguous examples of the already acting technology and initiatives towards automated law enforcement. Greg Conti: As we look to the future, has anyone seen Google’s Project Glass video? Even better, have you seen the parodies where they’re wearing the glasses and get...

Life Inside a Skinner Box: Automated Law Enforcement

This entry is based on the Defcon talk “Life Inside a Skinner Box*: Confronting our Future of Automated Law Enforcement” by researchers Lisa Shay, Greg Conti and Woody Hartzog about downsides of automated surveillance and law enforcement. Lisa Shay: Good afternoon. I’m Lisa Shay, I teach...

Criminal Education 3: Disrupting the Adversarial Market

This part of Art Gilliland’s keynote encompasses his view of the measures for preventing breaches, and the highlight of the role of intelligence for this. I think we need to define a new defense in depth for us. And part of that is building our capabilities at each stage of their value change (see...

Criminal Education 2: The Cybercrime Ecosystem

Art Gilliland’s focus in this part of the keynote is on the analysis of why enterprises are vulnerable and how the data breach cycle typically takes place. So let’s start by understanding a little bit more about us. Let’s discuss a little bit about how we are seen by the adversary. We are incredibly...

Criminal Education: Preventing Corporate Data Breaches

Art Gilliland, Senior Vice President & General Manager of HP Software Enterprise Security Products, expresses his vision of corporate information security during RSA Conference 2013 keynote speech “Criminal Education”. Thank you very much and good afternoon! My name is Art Gilliland, and...

The Effect of Password Strength Meters 5: Questions & Answers

Blase Ur’s presentation at USENIX ends with a Q&A part which is reflected in this entry and sheds yet more light upon the details related to password meters. Question: I really liked the study and I applaud your large sample size. I’m wondering if you had any way of measuring user tendency to...

The Effect of Password Strength Meters 4: What Makes Meters Matter?

Blase Ur provides herein the results by metrics affecting time of password creation, user sentiment, memorability, and summarizes the study overall. Let’s move on to the password creation process. In particular, I’ll highlight the time it took the participants to create a password, and also how...

The Effect of Password Strength Meters 3: Password Composition and Guessability

In this entry Blase Ur walks us through the first two metrics for the study, namely the relation of password length and meter type, and results by guessability. Before I jump into our results, I’ll tell you a little bit about our participants. We had 2,931 of them recruited on Amazon’s Mechanical Turk...

The Effect of Password Strength Meters 2: Visual and Scoring Differences

Blase Ur proceeds with describing the workflow of the password meters study, highlighting here the impact of visual and scoring elements upon password strength. So, I just showed you a number of different features, and we, of course, wanted to know what each of these features is contributing. All of our...