- Malware Analysis How to Install Metasploit on REMnux
- Malware Analysis REMnux Version 4 Installation Notes
- Authentication Continuous and Seamless User Authentication with Biometrics
Continuous authentication can verify user identity beyond initial login by monitoring behavioral and physiological biometrics—face recognition, walking patterns, voice, and interaction...
- Authentication Creative Options for Better Authentication of Mobile Phone Users
Mobile phone authentication can move beyond awkward passwords and PINs by leveraging built-in sensors for fingerprints, walking patterns, facial geometry, voice, thermal imaging, and grip...
- Career Tips for Getting the Right IT Job: New Cheat Sheet
Landing the right IT job requires preparation before you start looking, strategic use of social networking, and knowing how to negotiate compensation. Key steps include crafting a targeted resume,...
- Risk Management Mutually-Assured Destruction as a Factor in Cyber Warfare
Since no practical defense exists against nation-state cyber intrusions, countries may need to compromise adversaries' IT assets to establish mutually-assured destruction as a deterrent. Nations with...