Monthly Archives: May 2013

(ISC)2 SecureRome Conference 2013

SecureRome Conference 2013 Tuesday, 9th July, 2013 Università degli studi di Roma “La  Sapienza“, Italy 08.45 – 09.15    Registration & Arrival Coffee                            Foyer to Aula Odeion                           09.15 – 09.20    Welcome Note Prof. Dr. Claudio Cilli Professor, University la Sapienza / EuropeanAdvisory Board Member, (ISC)2      Aula Odeion 09.20 – 09.30    Chairman’s Opening Remarks                         John Colley                         Managing Director, (ISC)² EMEA Aula Odeion                             09.30 – 10.15    Opening Keynote Address: TBC TBC TBC, University La Sapienza Aula Odeion             10.15 – 11.00    S1: What Skills are required in Infosec today? Richard Nealon Member of the (ISC)² Board of Directors &…

Strange Dark Matter Interactions Could Create Galactic Disks and Dark Light from Adam Mann

A small percentage of the dark matter in our universe might be able to interact with itself through an as yet unknown dark force, forming dark atoms and possibly even emitting dark light. via Wired: Wired Science http://www.wired.com/wiredscience/2013/05/double-disk-dark-matter/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wiredscience+%28Wired%3A+Blog+-+Wired+Science%29 Adam Mann Related articles Strange Dark Matter Interactions Could Create Galactic Disks and Dark Light Synopsis: A Second Dish of Dark Matter Physicists suggest possible existence of other kinds of dark matter Physicists suggest possible existence of other kinds of dark matter A new detector has a clever way of detecting dark matter Dark Matter – Not Darth Vada Latest dark matter…

(ISC)2 Webminar: Mobile Security: Tre Sistemi Operativi (e un quarto) in barca

Il 22 Maggio 2013 alle 17:00, Antonio Ierano, socio di (ISC)2 Italy Chapter, presentera’ il secondo approfondimento su “Mobile Security”. In questa sessione, Antonio illustrera’ i problemi legati alle diverse piattaforme (iOS, Android, Windows Phone e Blackberry) attualmente usate nei device mobili:  Tre  Sistemi Operativi (e un quarto) in barca iOS, Android e Windows si dividono fondamentalmente il mercato mobile tra tablet, smarthphone, e laptop. Quali sono le precauzioni da prendere quando li usiamo (o cerchiamo/dobbiamo usarli/farli usare) tutti insieme? Possono i nostri dati realmente essere condivisi tra differenti device in maniera sicura ed efficace? Quali soluzioni esistono sul mercato per facilitare…

Aiutate Martina

Se potete aiutare una firma non costa tanto. So cosa vuol dire ricevere una cartella delle tasse quando sei in difficoltà, e non basta dire che chi eseguiva eseguiva gli ordini la ho già sentita come giustificazione. Ma facciamo almeno che in questa guerra rea disperati almeno si aiuti la mamma di Martina. Chissà se formeranno anche chi quella cartella la ha firmata consegnata posta in esecuzione mettendo una casa all’asta. A già eseguiva ordini…dura Lex sed lex…. ma anche se etico questo é morale? Chiedi insieme a “Servizio Pubblico” che le ustioni della mamma di Martina vengano curate in…

should we deserve a feedback after an interview?

There are a lot of things that I do not like today, probably because as a “new position seeking” person I’m more vulnerable or may be because of my situation I have to relate in a different way with different people. One of the thing that hurt me more when seeking for a job is the feedback, or, to say the truth, the absolutely lack of feedback coming form your counterpart.  I understand that hiring someone is a process that require selection and that is focused on needs that are not always visible to the candidate, but anyway in a correct and…

See the first PHOTO ever uploaded to the Internet.

See the first PHOTO ever uploaded to the Internet. Related articles SEE The First Photo Ever Uploaded To The Internet. (jeniesgiovanni.wordpress.com) 15 internet “firsts”: First email, first spam message, first picture ever uploaded … (holykaw.alltop.com) Death To Bullshit (slideshare.net) My uploads never seem to do all that good normally, so now I’m gonna cheat. (imgur.com) I’m uploading this just so that I can remember to do it in the morning. (imgur.com) Be careful what you Snapchat (joyceyl.wordpress.com) Template:FR2012/thankyoudetail bottom (wikimediafoundation.org) How to Preset or Pre-Attach a File in PHP File Upload (daniweb.com) So Australia’s capital is turning 100 this year,…

‘Thin and beautiful’ customers ONLY: #Abercrombie I’m not one of your customer (and I’ll never be)

I know , I know I’m not an healthy example but I confess I am not so sad to not be an Abercrombie target 🙂 although would be nice to be in shape and handsome I barely think I would anyway be an Abercrombie customer. and to be clear is not because of they want to target a specific market sector, but because of the things I’ve read on why and how they plan to do. But beside the fact I’m old, fat, bald and ugly I’m also one of those old crazy people who thinks that ethic should always be present in any aspect of our…

(ISC)2 Italy Chapter Site » Mobile Security Series – Beyond BYOD – Slides

(ISC)2 Italy Chapter Site » Mobile Security Series – Beyond BYOD – Slides Mobile Security Series – Beyond BYOD – Slides inShare1 Le slide del primo approfondimento (ISC)2 Italy Chapter sul Mobile (Beyond BYOD) sono disponibili ai soci a questo link(*): Webinar – (ISC)2 Italy – Mobile Series 1 – Beyond BYOD Ringraziamo tutti coloro che hanno seguito il seminario e ancor di piu’ chi ha dedicato del tempo per completare il sondaggio sull’iniziativa. Stay tuned: nelle prossime settimane vi informeremo sulle date del secondo e poi del terzo seminario della serie. (*) Per accedere alle slides e’ necessario essere Soci di (ISC)2 Italy Chapter; l’utenza…

Posts navigation