The CIO and CISO of Creative Artists Agency, Michael Keithley and Jeff Blair, joined the Tailgating Security team to talk about the changes in CAA’s IT shop over the last five years, what they see as their biggest security challenges, and which actor each one would want to portray them in the movie versions of their lives.Read more »
While knocking back an seemingly endless stream of coffee and pancakes at breakfast today, I read an article in NASA Tech Briefs about a new form of soldering that will absolutely change how fast we deploy semiconductors in manufacturing.
If you REALLY wanna geek it up, here’s the actual published work.Read more »
If you ever brought in a piece of chewing gum back in elementary school, teachers were quick to instill a sense of fair play with your peers by saying something along the lines of, “did you bring enough for the rest of the class?” I don’t know about your experiences, but I never saw a kid actually have enough to share with an entire class! As that one lucky student enjoyed his/her treat, the rest of the students sat and suffered in agony, devoid of the experience.
Fortunately, unlike a snack or a piece of gum, when it comes to sharing thoughts and ideas about enterprise security—there’s usually plenty to go around. This can be beneficial, providing security practitioners a platform to share information in their common pursuit of security.Read more »
I love games. Card, video, board—heck, it really does not matter. I prefer video games, but something fun and challenging is always a hoot! I started to get into fantasy board games after visiting Orc’s Nest in London. My wife and I went there to learn how to play D&D, but got hooked on Firefly instead. (We still have no clue how to play D&D.)
Recently, we started playing Star Wars: Imperial Assault.Read more »
Two of my credit card companies detected fraudulent transactions on my cards worth $19,896 last month. My credit card information was probably stolen by the hackers that broke into the databases of a number of banks and retailers last year.
Hackers break into a data center, steal credit card numbers, and then sell them—usually online. People can buy the stolen credit cards from websites and then go on a shopping spree. The sites selling these credit cards even had a Black Friday sale last year.Read more »