We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

110 Results for: "Aaron Shi"


April 5, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Shi, IANS Director of Web Development & Security

 Ensure Your User IDs Are Encrypted

In the wake of the Equifax breach and other high-profile incidents, organizations are enforcing encryption across all PII and passwords, but what about user IDs? In this Ask-an-Expert written response, IANS Director of Web Development and Security Aaron Shi explains why user IDs are often left in the clear and offers a simple way to bring them into the encryption fold.

Read More »

May 12, 2015 | Vulnerability Assessment and Management
By Daniel Maloof, IANS Managing Editor

 Aaron Turner to Deliver a Feature Presentation at ISSA-LA Information Security Summit

When you think about the marvel that is the international cellular network, it is truly amazing to realize that the ability to communicate with one another is very nearly universal. But, as with any complex network, there are significant opportunities for attackers to exploit vulnerabilities in components of the system.

Read More »

August 16, 2018 | Embedded Systems and Internet of Things
By Aaron Turner, IANS Faculty

 Gauge Threats Against City Surveillance Systems

The internet of things (IoT) is often targeted by malicious actors, but what type of threats are most common for city surveillance systems such as red light/speed cameras? In this Ask-an-Expert written response, IANS Faculty Aaron Turner says to watch out for cryptocurrency opportunists, among others.

Read More »

August 8, 2018 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Create a Practical Mobile Security Roadmap

Mobile devices in the enterprise are simply a given today. So why are they so difficult to secure? In this report, IANS Faculty Aaron Turner provides some key insights into the true risk of top mobile platforms like Apple iOS and Google Android, and offers practical strategies for properly managing and securing them.

Read More »