Friday Summary: STEM

2014/08/21

Source: Securosis.com

Thumbnail for 401442
Thumbnail for 401429

Air Force Leaders Should Read This Book

2014/08/21

Source: TaoSecurity

Thumbnail for 401427
Thumbnail for 401425
Thumbnail for 401423
Thumbnail for 401421

Malicious app can get past Android WITHOUT PERMISSIONS

2014/08/21

Source: TheRegister.co.uk

Thumbnail for 401417

4 ‘cyberhealth’ strategies for boards

2014/08/21

Source: VentureBeat.com

Maryland creates fund to support cybersecurity startups

2014/08/21

Source: HomelandSecurityNewsWire.com

Thumbnail for 401412

Know Your Advanced Persistent Threats (APTs) Unknowns

2014/08/21

Emulex, a leader in network connectivity, monitoring and management, provides hardware and software solutions for global networks that support enterprise, cloud, government and telecommunications. Emulex’s products enable unrivaled end-to-end application visibility, optimization and acceleration. The Company’s I/O connectivity offerings, including its line of ultra high-performance Ethernet and Fibre Channel-based connectivity products, have been designed into […]

Thumbnail for 401410

Stealing encryption keys through the power of touch

2014/08/21

Source: ArsTechnica.com

Thumbnail for 401407

Looking Beyond the Surface of Security Culture

2014/08/21

Source: InformationSecurityBuzz.com

Thumbnail for 401404
Thumbnail for 401402

What Customers Want With Online Security

2014/08/21

Source: InformationSecurityBuzz.com

James Foley murder: inside the mind of Britain’s jihadists

2014/08/21

Source: HomelandSecurityNewsWire.com

Thumbnail for 401397

Study Shows Higher Education Needs Security 101

2014/08/21

Source: TripWire.com – The State of Security