Search for: "Authentic Designs" Results 1541 - 1560 of 2,918
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
22 Jun 2017, 11:37 am by Will R. Daugherty
Scanning a company’s public-facing systems for indications of vulnerabilities, such as out-of-date operating systems, the absence of multifactor authentication and poor patching practices. [read post]
19 Jun 2017, 9:01 pm by Joanna L. Grossman
The Supreme Court has been asked repeatedly over four decades to answer some version of the same question: do fathers have the same right as mothers to pass on American citizenship to their children? [read post]
19 Jun 2017, 4:06 am by Matthew Dresden
Grey market goods are authentic goods sold by unauthorized means. [read post]
13 Jun 2017, 1:58 pm by Divya Taneja
”  It remains to be seen how broadly “security purpose” will be construed, and whether it would cover, for example, a mobile platform storing fingerprints to secure a phone, a payment card brand partnering with e-commerce retailers to authenticate transactions using emerging data security features that use biometrics in lieu of, or in addition to, passwords. [read post]
Companies must implement and maintain “reasonably designed” written cybersecurity procedures. [read post]
7 Jun 2017, 9:55 am by Trent Dykes
By design, blockchains are inherently resistant to modification of the data. [read post]
7 Jun 2017, 9:55 am by Trent Dykes
By design, blockchains are inherently resistant to modification of the data. [read post]
7 Jun 2017, 8:25 am by Nicholas Weaver
It is well understood in the security community that most two-factor authentication systems, including SMS or authenticator applications, do not actually protect against phishing. [read post]
6 Jun 2017, 12:53 am by Hui Zhang
Background WLAN Authentication and Privacy Infrastructure (WAPI) is a Chinese national standard for wireless local area network (WLAN). [read post]
4 Jun 2017, 6:30 am by Amira Mikhail, Jordan Brunner
”   Scope of Equitable Relief Lastly, the government argues that the district court’s injunction on Section 2(c) is overbroad and is not designed to redress the plaintiff’s cognizable injuries as required under Article III of the constitution. [read post]
31 May 2017, 7:30 am by David Canton
Effective security requires a holistic system wide approach designed, implemented, and updated by IT professionals. [read post]
25 May 2017, 5:00 am by Gerry Riskin
” In this context, “small firm” does not imply revenues, clients or vision; rather, a “small firm” is simply a designation to let the outside world know that your firm employs ten or fewer attorneys. [read post]
24 May 2017, 12:03 pm by Guest Blogger
Yet since the 1990s, the equal protection clause has required strict scrutiny of any district in whose design race was the “predominant factor. [read post]
24 May 2017, 8:17 am by Scott Bomboy
However, where compliance with a subpoena duces tecum would constitute implicit testimonial authentication of the documents produced, the privilege may apply,” the CRS says. [read post]
23 May 2017, 8:20 am by Charlotte Garden
A primary purpose of the Hague Service Convention is to require signatory states to designate a central authority that can handle cross-border service requests. [read post]
22 May 2017, 9:01 pm by Joanna L. Grossman
The acknowledgment requirement was designed to authenticate the signature and to impose on the signer “a measure of deliberation in the act of executing the document. [read post]
17 May 2017, 5:53 am
"From "Open, Non-Monogamous, Poly or Designer Relationships/What the NY Times Article Missed and What Therapists Need to Learn" by sex therapist Sari Cooper in Psychology Today. [read post]
15 May 2017, 6:13 pm by Dennis Crouch
Claim 1 merely recites the familiar concepts of receiving, authenticating, and publishing data. [read post]
So the President determines the system of designating classified information through Executive Order, and he is entitled to depart from it at well. [read post]