Security
How do you protect legacy technology from the threats of tomorrow? Security chief at world's oldest telecoms firm shares rare insights into its move towards a post-trust world
No plan survives contact.
The Home Office wants to expand mobile biometric services "into the modality of face” by “exploiting the ubiquitous imaging capability now omnipresent in smartphones.”
No confidence in “competence, reliability, and integrity” of company says Chrome team as frustrations build to a head – just days after Entrust grovelled to the CA/Browser forum.
"Hi. This is the Prezident here on zelensky.prank@rebel.spirit. Can I have your number and your friends' too?"
"Note: This is 100% of a single core. In an 8-core system for example, an additional 12.5% of unexpected total CPU load would be experienced..."
Fix up, look sharp: Uncle Sam is running out of patience with tech firms shipping insecure software. Vendors? Get familiar with the phrase "query parameterization"...