Search for: "Authentic Designs" Results 1421 - 1440 of 2,918
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
9 Apr 2021, 9:05 am by Jonathan Reiber, Matt Glenn
U.S. military bases have layers of walls, guards, badge readers, and authentication measures to control access. [read post]
12 Sep 2021, 7:01 am by Danielle Gilbert
“No concessions” policies are also designed to deny benefits to hostage-takers. [read post]
22 Feb 2022, 5:01 am by Jim Dempsey
One requires encryption of signals for integrity and authentication, but only for the subset of control systems known as positive train control. [read post]
20 Jun 2022, 1:09 pm
Perceived by some as a distraction from existing efforts to create a binding treaty in the field, others consider the treaty design choice for a framework agreement as offering a promising and realistic route. [read post]
8 Jun 2022, 5:01 am by Jane Bambauer
The GDPR basically ensures that some degree of network effects are preserved because, by design, it prevents personal data from being transmitted without consent. [read post]
8 Nov 2017, 7:40 am by Wolfgang Demino
 In a recent HOA assessment case, the San Antonio court of appeals affirmed a take-nothing judgment entered after exclusion of the association's witness because the witness had not been disclosed and was to do more than merely authenticate business records. [read post]
8 Nov 2017, 7:40 am by Wolfgang Demino
 In a recent HOA assessment case, the San Antonio court of appeals affirmed a take-nothing judgment entered after exclusion of the association's witness because the witness had not been disclosed and was to do more than merely authenticate business records. [read post]
4 Jan 2017, 8:47 pm by Tiffany Quach
For the requirements in sections 500.04(b) (Chief Information Security Officer report), 500.05 (penetration testing and vulnerability assessments), 500.09 (risk assessment), 500.12 (multi-factor authentication), and 5000.14(a)(2) (cybersecurity training for personnel), the compliance deadline is March 1, 2018. [read post]
Q&A
11 Mar 2012, 2:27 pm by admin
Levine:  Ipsos public affairs – designed to get a spectrum of views. [read post]
10 Jun 2024, 4:00 am by jonathanturley
., 2021 as evidence of the pending collapse of democracy, the system worked as designed on that day. [read post]
1 Jul 2024, 5:47 am by Jean O'Grady
Lex Machina’s analytics platform was designed through a combination of human and machine analysis of docket data. [read post]
3 Mar 2010, 2:44 pm
The incentives for improvement and the protection of invention apply as well to the creator of a new hair-extension design as to a researcher pursuing a cure for cancer. [read post]
22 Jul 2021, 10:35 am by Gabriel Band
First, target audience and degree of reach: Is the operation designed to target the population of concern, and has it broken into public discourse? [read post]
28 Sep 2015, 8:00 am by Will R. Daugherty
These initial examinations were designed to discern basic distinctions in the level of preparedness among the examined firms and focused on cybersecurity governance, network and information security policies and procedures, vendor management policies, and online customer access. [read post]
12 May 2009, 7:38 am
" Prior approval should be sought prior to use of such official designations and markings in marketing or promotional material. [read post]
10 Jul 2018, 5:00 am by Greg Nojeim
Congress passed the Cloud Act as part of an omnibus spending bill in March over the objection of many civil society groups, including the Center for Democracy & Technology (with which I am affiliated). [read post]
30 Jul 2012, 3:09 pm by Kim Zetter
But the researchers found that the terminals do not authenticate the servers with which they communicate, so the researchers were able to design a man-in-the-middle attack that tricks the terminal into communicating with their rogue server and allows them to download malware to the device. [read post]