Two-factor authentication is a computer security measure used by major online service providers to protect the identify of users in the event of a password loss. Security experts have long endorsed two-factor authentication as an [...]
How will recent legislation, such as The Cybersecurity Information Sharing Act 2015, affect healthcare? What are the current threats against healthcare organizations, and how can they find the right balance between innovation and security?
Six months of global ship tracking AIS data visualized using webgl rendering: 10 million data points dynamically rendered at 60 frames per second using open source canvas layer tool for the Google Maps API. Global [...]