February 25 2013, Episode 292, Show Notes
Episode 292 of The CyberJungle is about 36 minutes long. The interview with Alex Doll, CEO of OneID, on two factor authentication using elliptical curve cryptography begins at about the 21min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.
To listen to Episode 292 via the flash player:
Alex Doll, CEO of OneID, on their approach to using two factor authentication with elliptical curve cryptography. The company says the primary purpose of OneID as a digital identity provider. Here’s their blog.
Tales From The Dark Web
Reuters – Analysis: The near impossible battle against hackers [sic] everywhere
Tales Our Take On This Week’s News
Google’s Android Reborn as Network-Hacking Kit
EdgeWave ‘Social Security‘
Please support our sponsors, as they support The CyberJungle
SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.
SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.
SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.
This entry was posted on February 25, 2013 at 9:13 pm and is filed under Exclusive, Show Notes, The CyberJungle with tags elipical curve cryptography, Linux, Open Source, passwords, social media security, two factor. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.