Artwork

Content provided by Plymouth University. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Plymouth University or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Insider Misuse Identification - Applying Transparent Biometrics

11:31
 
Share
 

Archived series ("Inactive feed" status)

When? This feed was archived on June 24, 2018 13:54 (6y ago). Last successful fetch was on April 13, 2018 08:41 (6y ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 179026456 series 84724
Content provided by Plymouth University. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Plymouth University or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Nathan Clarke describes two approaches to utilising transparent biometrics for investigating and attributing insider misuse: a proactive approach that embeds biometrics within digital objects (to identify and attribute the source of any stolen information); and a reactive measure that seeks to identify users from network meta-data. The talk was part of the panel session at the 16th Annual Security Conference, held in Las Vegas from 18-20 April 2017. [(CC) BY-NC-SA 2.0 UK]
  continue reading

187 episodes

Artwork
iconShare
 

Archived series ("Inactive feed" status)

When? This feed was archived on June 24, 2018 13:54 (6y ago). Last successful fetch was on April 13, 2018 08:41 (6y ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 179026456 series 84724
Content provided by Plymouth University. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Plymouth University or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Nathan Clarke describes two approaches to utilising transparent biometrics for investigating and attributing insider misuse: a proactive approach that embeds biometrics within digital objects (to identify and attribute the source of any stolen information); and a reactive measure that seeks to identify users from network meta-data. The talk was part of the panel session at the 16th Annual Security Conference, held in Las Vegas from 18-20 April 2017. [(CC) BY-NC-SA 2.0 UK]
  continue reading

187 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide