4 Articles Tagged hacking

How Wi-Fi Location-Based Services Can Step Up Your Public Safety Game

How Wi-Fi Location-Based Services Can Step Up Your Public Safety Game

  • Greg Deffenbaugh
  • October 27, 2016 | Estimated reading time: 6 minutes to read
  • My first job out of college was working on Sonar Systems for the U.S. Navy. Modern sonar systems passively listen in the ocean to identify…
An Exploration of End-to-End Network Segmentation Part III: Automatic Elasticity

An Exploration of End-to-End Network Segmentation Part III: Automatic Elasticity

  • Jean Turgeon
  • October 19, 2016 | Estimated reading time: 4 minutes to read
  • Imagine for a moment: you’re connected to a network via a piece of string. You perform your work, you wind down for the day and…
Hacking Challenge

How to Fail a Hacking Challenge

  • Maan Al-Shakarchi
  • July 20, 2016 | Estimated reading time: 2 minutes to read
  • 32 million Twitter passwords stolen, 117 million LinkedIn accounts compromised, and even Marc Zuckerberg’s Pinterest account hacked—there seems to be no let-up in IT security…

Hacking 911: Is the Genie out of the Bottle?

  • Mark J. Fletcher, ENP
  • August 25, 2014 | Estimated reading time: 3 minutes to read
  • For many years a level of frailty has existed in the nation's 911 network and its primary level of protection has been "security through obscurity".…