Now showing items 1-6 of 6
Protect Your Unicorn From Hunters
(Georgia Institute of Technology, 2019-01-18)
Information security certifications, frameworks, and regulatory requirements provide a good foundation for startups to build an information security program. Since a security breach could put a startup out of business, ...
Stopping Fraudsters by Changing Products
Lyft’s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as possible. This streamlined process is great for users, but presents an ever-present ...
Developing Secure Products
(Georgia Institute of Technology, 2019-02-01)
[Emil Man] As part of Honeywell’s digitization of our business, we have been working on moving towards distributed computing through microservice architecture deployments. As we also work on moving our software products ...
Defending Organizations in a Fast-Moving Cyber Arms Race
(Georgia Institute of Technology, 2019-02-08)
This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security architect. Providing more than just breach detection, ...
Improving Security Through Software Debloating
(Georgia Institute of Technology, 2019-03-01)
As software security breaches continue to increase in frequency and sophistication, there has been an increase in the research and development of new methods for improving software security. One such method that has seen ...
Caller Authentication Using Mobile Devices
(Georgia Institute of Technology, 2019-04-12)
Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the caller’s phone number is easily ...