Search for: "Authentic Designs"
Results 1561 - 1580
of 2,918
Sort by Relevance
|
Sort by Date
12 May 2017, 1:08 pm
It could be a desire for control, a fetishization of purity, a fantasy of authenticity, a need for something like religion, a solution to aimless anxiety. [read post]
9 May 2017, 11:43 am
The same Russian-based criminal group, designated by Mandiant as “Fin5,” was responsible for five of the 10 largest network intrusion attacks. [read post]
8 May 2017, 12:32 pm
Some of the other modules include hardware-based authentication code and a system for location tracking and remote wiping of laptops for anti-theft purposes. [read post]
3 May 2017, 10:48 am
That would be a lot more authentic. [read post]
3 May 2017, 4:24 am
Consider Two-Factor Authentication: Consider requiring multi-factor authentication that requires additional information (i.e., an additional pass-code delivered to a designated secondary device) beyond a password to gain entry. [read post]
3 May 2017, 4:24 am
Consider Two-Factor Authentication: Consider requiring multi-factor authentication that requires additional information (i.e., an additional pass-code delivered to a designated secondary device) beyond a password to gain entry. [read post]
26 Apr 2017, 7:48 am
I can not and do not verify the authenticity of these documents, nor can I confirm the truth of the statements made in the documents. [read post]
25 Apr 2017, 12:03 pm
The cybersecurity procedures must also provide for: An annual cybersecurity risk assessment; The use of secure email, including use of encryption and digital signatures; Authentication practices for employee access to electronic communications, databases and media; Procedures for authenticating client instructions received via electronic communication; and Disclosure to clients of the risks of using electronic communications. [read post]
25 Apr 2017, 10:52 am
Stefik disclosed an authentication system designed to control access to digital works stored in a repository. [read post]
20 Apr 2017, 3:34 pm
Because of their flexible design and participant-driven method, scenarios are valuable in their ability to deliver high-energy discussions and consolidate viewpoints. [read post]
18 Apr 2017, 4:08 pm
It was directed to a system and method for authenticating a webpage. [read post]
17 Apr 2017, 6:25 pm
Each Big Bagel Bundle includes a choice of any 13 bagels from among Bruegger’s Bagels’ authentic, New York-style bagel varieties, along with any two tubs of 100 percent made-in-Vermont cream cheese. [read post]
17 Apr 2017, 5:27 am
Our friends at Cuba CounterPoints have published a great April issue XVI. [read post]
10 Apr 2017, 12:01 pm
” In a slight twist, the program must also be designed to fulfill applicable reporting obligations imposed by the Rule. [read post]
10 Apr 2017, 3:13 am
” And as the Wall Street Journal notes, other reasons for excluding Iraq included that Iraqi travelers are relatively easy to authenticate because they must submit to biometric documentation to get passports. [read post]
9 Apr 2017, 10:45 am
For example, the Controls suggest that outside counsel be required to maintain logical access controls designed to manage access to Company Confidential information and system functionality on a least privilege and need-to-know basis, including through the use of defined authority levels and job functions, unique IDs and passwords, [and] two-factor or stronger authentication for its employee remote access systems. [read post]
7 Apr 2017, 6:21 am
The JobsOhio authentication process is designed to identify sites that are "ready to develop on day one, saving businesses time and money. [read post]
6 Apr 2017, 8:00 am
Under the Proposed Rule, the Colorado Securities Commissioner could consider the following factors to determine whether an adviser’s or dealer’s written procedures had been “reasonably designed”: Size of the firm; Relationships with third parties; Policies, procedures, and training of employees; Authentication practices; Use of electronic communications; Automatic locking of devices used to conduct the firm’s electronic security; and Process for… [read post]
6 Apr 2017, 4:00 am
You can grant specific clients access to designated matter files, specific documents, notes, and events on those files. [read post]
4 Apr 2017, 11:39 am
By design, it was meant to turn the political system against itself, and it succeeded. [read post]