Search for: "Authentic Designs" Results 1561 - 1580 of 2,918
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
12 May 2017, 1:08 pm
It could be a desire for control, a fetishization of purity, a fantasy of authenticity, a need for something like religion, a solution to aimless anxiety. [read post]
9 May 2017, 11:43 am by Randal L. Gainer
The same Russian-based criminal group, designated by Mandiant as “Fin5,” was responsible for five of the 10 largest network intrusion attacks. [read post]
8 May 2017, 12:32 pm by erica
Some of the other modules include hardware-based authentication code and a system for location tracking and remote wiping of laptops for anti-theft purposes. [read post]
3 May 2017, 4:24 am by Jon Hyman
Consider Two-Factor Authentication: Consider requiring multi-factor authentication that requires additional information (i.e., an additional pass-code delivered to a designated secondary device) beyond a password to gain entry. [read post]
3 May 2017, 4:24 am by Jon Hyman
Consider Two-Factor Authentication: Consider requiring multi-factor authentication that requires additional information (i.e., an additional pass-code delivered to a designated secondary device) beyond a password to gain entry. [read post]
26 Apr 2017, 7:48 am by Clay Hodges
I can not and do not verify the authenticity of these documents, nor can I confirm the truth of the statements made in the documents. [read post]
25 Apr 2017, 12:03 pm by Peter Stockburger
The cybersecurity procedures must also provide for: An annual cybersecurity risk assessment; The use of secure email, including use of encryption and digital signatures; Authentication practices for employee access to electronic communications, databases and media; Procedures for authenticating client instructions received via electronic communication; and Disclosure to clients of the risks of using electronic communications. [read post]
25 Apr 2017, 10:52 am by James Yang
Stefik disclosed an authentication system designed to control access to digital works stored in a repository. [read post]
20 Apr 2017, 3:34 pm
Because of their flexible design and participant-driven method, scenarios are valuable in their ability to deliver high-energy discussions and consolidate viewpoints. [read post]
18 Apr 2017, 4:08 pm by James Yang
It was directed to a system and method for authenticating a webpage. [read post]
17 Apr 2017, 6:25 pm by Kelly Phillips Erb
Each Big Bagel Bundle includes a choice of any 13 bagels from among Bruegger’s Bagels’ authentic, New York-style bagel varieties, along with any two tubs of 100 percent made-in-Vermont cream cheese. [read post]
10 Apr 2017, 12:01 pm by Nathan D. Taylor and Adam Fleisher
” In a slight twist, the program must also be designed to fulfill applicable reporting obligations imposed by the Rule. [read post]
10 Apr 2017, 3:13 am by Lana Ulrich
” And as the Wall Street Journal notes, other reasons for excluding Iraq included that Iraqi travelers are relatively easy to authenticate because they must submit to biometric documentation to get passports. [read post]
 For example, the Controls suggest that outside counsel be required to maintain logical access controls designed to manage access to Company Confidential information and system functionality on a least privilege and need-to-know basis, including through the use of defined authority levels and job functions, unique IDs and passwords, [and] two-factor or stronger authentication for its employee remote access systems. [read post]
7 Apr 2017, 6:21 am by Joe Koncelik
The JobsOhio authentication process is designed to identify sites that are "ready to develop on day one, saving businesses time and money. [read post]
6 Apr 2017, 8:00 am by Michael Kohuth
Under the Proposed Rule, the Colorado Securities Commissioner could consider the following factors to determine whether an adviser’s or dealer’s written procedures had been “reasonably designed”: Size of the firm; Relationships with third parties; Policies, procedures, and training of employees; Authentication practices; Use of electronic communications; Automatic locking of devices used to conduct the firm’s electronic security; and Process for… [read post]
6 Apr 2017, 4:00 am by Administrator
You can grant specific clients access to designated matter files, specific documents, notes, and events on those files. [read post]