• How to watch The Suicide Squad on HBO Max: Everything you need to know - CNET

    Updated: 2021-03-26 22:46:28
    Release date, the first trailer and everything else you need to know to watch the insane-looking supervillain flick.

  • Apple patches iPhone, iPad security flaw with updated iOS 14.4.2 - CNET

    Updated: 2021-03-26 20:30:00
    A vulnerability was discovered that could allow malicious web content to access private data on Apple mobile devices, but the fix is now live.

  • Apple Watch may get 'Explorer Edition,' a rugged, extreme-sports version, report says - CNET

    Updated: 2021-03-26 19:47:00
    A new edition of the wearable could include better impact resistance and a rubberized exterior, sources tell Bloomberg. But they also say it's still a ways off.

  • What's Section 230? The social media law is in the crosshairs of Congress - CNET

    Updated: 2021-03-26 17:40:00
    The law has served as a legal shield for social media companies. Now lawmakers say it should be changed to hold companies accountable.

  • Facebook plans to start reopening offices on May 10 - CNET

    Updated: 2021-03-26 17:25:00
    Its headquarters and other Bay Area locations will open at 10% capacity, if COVID case numbers continue to drop.

  • Dominion Voting hits Fox News with $1.6B suit over 2020 election claims - CNET

    Updated: 2021-03-26 15:05:00
    The network pushed a "manufactured" story "to serve its own commercial purposes," according to the voting hardware and software company.

  • About The Privacy Blog

    Updated: 2021-03-21 22:50:02
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Lance Cottrell In August of 2015 I decided to start blogging about privacy and security . issues I created this blog to support Anonymizer.com†s consumer privacy service . From 2015 through 2018 the blog was owned and supported by Anonymizer†s parent company , . Ntrepid When Anonymizer discontinued its consumer anonymity VPN service , we transferred the domain and blog to me personally because it was not longer relevant to the business . It is likely to be quiet here . This is mostly serving as an archive of my writings and thoughts over the . years To see my more recent thoughts , please read my Musings at Obscura.com or my blogs at Ntrepidcorp.com Privacy Policy

  • Contact The Privacy Blog

    Updated: 2021-03-21 22:50:01
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Contact Us The Privacy Blog welcomes your feedback . Please note , we are not accepting any guest blogs or contributed . content Please complete the form below Name First Name Last Name Email Address Subject Message Thank you Privacy Policy

  • The Privacy Blog

    Updated: 2021-03-21 22:49:59
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search See more Privacy Policy

  • Privacy focused art show in Plano Texas The Privacy Blog

    Updated: 2021-03-21 22:49:58
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Privacy focused art show in Plano Texas January 03, 2020 by Lance Cottrell I recently received a press release that intrigued me and though might interest you . There is going to be a multi-media art installation focused on modern privacy risks that looks like it could be fun . Here is the : release “Intelligence : An Art Show About Data Collection” by Sue Anne Rische opens in . February PLANO , TX – January 2, 2020, Multimedia artist Sue Anne Rische announces the art exhibition “Intelligence : An Art Show About Data Collection” at The Arts Gallery in Plano , TX . The show will be on view from Wednesday , February 19 – Wednesday , March 18, 2020. An “Art Café” lecture will take place Thursday ,

  • The Privacy Blog

    Updated: 2021-03-21 22:49:57
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Privacy focused art show in Plano Texas January 03, 2020 by Lance Cottrell I recently received a press release that intrigued me and though might interest you . There is going to be a multi-media art installation focused on modern privacy risks that looks like it could be fun . Here is the : release “Intelligence : An Art Show About Data Collection” by Sue Anne Rische opens in . February PLANO , TX – January 2, 2020, Multimedia artist Sue Anne Rische announces the art exhibition “Intelligence : An Art Show About Data Collection” at The Arts Gallery in Plano , TX . The show will be on view from Wednesday , February 19 – Wednesday , March 18, 2020. An “Art Café” lecture will take place Thursday ,

  • Privacy focused art show in Plano Texas The Privacy Blog

    Updated: 2021-03-21 22:49:51
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Privacy focused art show in Plano Texas January 03, 2020 by Lance Cottrell I recently received a press release that intrigued me and though might interest you . There is going to be a multi-media art installation focused on modern privacy risks that looks like it could be fun . Here is the : release “Intelligence : An Art Show About Data Collection” by Sue Anne Rische opens in . February PLANO , TX – January 2, 2020, Multimedia artist Sue Anne Rische announces the art exhibition “Intelligence : An Art Show About Data Collection” at The Arts Gallery in Plano , TX . The show will be on view from Wednesday , February 19 – Wednesday , March 18, 2020. An “Art Café” lecture will take place Thursday ,

  • I may be quiet here but I am making a lot of noise elsewhere The Privacy Blog

    Updated: 2021-03-21 22:49:50
    , The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search I may be quiet here , but I am making a lot of noise elsewhere July 31, 2019 by Lance Cottrell ThePrivacyBlog has gotten quiet recently because all my writing has been focused on some other . topics At Feel the Boot I am blogging about startups , entrepreneurship , and angel investing . I am passionate about helping founders realize their entrepreneurial . dreams Over at the Ntrepid blog I am writing about managed attribution and online operations . There I focus on my passion for privacy , anonymity , managed attribution , and online . operations July 31, 2019 Lance Cottrell Newer Older Privacy Policy

  • What is OSINT The Privacy Blog

    Updated: 2021-03-21 22:49:49
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search What is OSINT March 19, 2019 by Lance Cottrell Over on the Ntrepid blog and YouTube channel I recently created a piece on open source intelligence gathering . Much of what we need to know about threat actors is available if you take the time to look . People often get very worked up about the privacy implications of OSINT , but it is only about collecting public data , not digging into secrets . I also talk about some of the complexities and risks of OSINT . gathering The blog is here The video is here March 19, 2019 Lance Cottrell Newer Older Privacy Policy

  • What Is OSINT Ntrepid

    Updated: 2021-03-21 22:49:48
    Skip to content Ntrepid Products of Magnitude Search : for 1.800.921.2414 Contact Us Global Menu What Is OSINT Written by Lance Cottrell on February 12, 2019 in Nfusion Open Source Intelligence , or OSINT is intelligence developed from sources that are free , public , and legal to access . This should not be confused with Open Source Software . OSINT is the opposite of many other forms of intelligence . Unlike sources of intelligence like spies , satellites , sensors , and hackers OSINT is about developing impactful understanding based on information that is intentionally public . It is amazing how much of the information a government or business needs to know can be found through . OSINT The term OSINT originated in the 1980s , but the idea is much older . People have long read newspapers

  • What is OSINT The Privacy Blog

    Updated: 2021-03-21 22:49:46
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search What is OSINT March 19, 2019 by Lance Cottrell Over on the Ntrepid blog and YouTube channel I recently created a piece on open source intelligence gathering . Much of what we need to know about threat actors is available if you take the time to look . People often get very worked up about the privacy implications of OSINT , but it is only about collecting public data , not digging into secrets . I also talk about some of the complexities and risks of OSINT . gathering The blog is here The video is here March 19, 2019 Lance Cottrell Newer Older Privacy Policy

  • The GrinchBot who Stole Christmas The Privacy Blog

    Updated: 2021-03-21 22:49:46
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The GrinchBot who Stole Christmas November 29, 2018 by Lance Cottrell A new online scam is picking up speed and is particularly active during the holidays : GrinchBots . There are many limited edition products , from special sneakers to collectable toys . They can be in very high demand compared to the available supply . That is where the Grinch comes in . The attackers use automated tools to buy up almost all of the inventory of the items , then re-sell them at a huge markup on sites like . eBay Unfortunately there is not much you can do to protect yourself , but retailers can make it much harder to launch this kind of attack . If you think a site has been hit by the GrinchBots , let them know that you are not

  • The GrinchBot who Stole Christmas The Privacy Blog

    Updated: 2021-03-21 22:49:44
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The GrinchBot who Stole Christmas November 29, 2018 by Lance Cottrell A new online scam is picking up speed and is particularly active during the holidays : GrinchBots . There are many limited edition products , from special sneakers to collectable toys . They can be in very high demand compared to the available supply . That is where the Grinch comes in . The attackers use automated tools to buy up almost all of the inventory of the items , then re-sell them at a huge markup on sites like . eBay Unfortunately there is not much you can do to protect yourself , but retailers can make it much harder to launch this kind of attack . If you think a site has been hit by the GrinchBots , let them know that you are not

  • Where To Go From Here The Privacy Blog

    Updated: 2021-03-21 22:49:36
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Where To Go From Here November 26, 2018 by Lance Cottrell I am not posting to The Privacy Blog as often as I did in the past . That does not mean I have stopped writing Please check out my blogs at Obscura.com and at Ntrepid Those will also include links to articles I have written , recorded webinars , conference talks , and . more November 26, 2018 Lance Cottrell Newer Older Privacy Policy

  • Blog Ntrepid

    Updated: 2021-03-21 22:49:29
    Skip to content Ntrepid Products of Magnitude Search : for 1.800.921.2414 Contact Us Global Menu Blog Breaking Down the OSINT Cycle Transforming open source data into intelligence , or OSINT , has become increasingly complex over the last decade . Although more open sources are available to operators , the dramatic increase of false information and adversarial counter attacks online have made the collection of data an even more tedious process . Known as the OSINT cycle , the process of collecting , analyzing , and disseminating publicly sourced information will propel any OSINT mission . forward Read More . Written by Ntrepid on December 14, 2020 in Case Studies Share This Article Twitter Facebook Google+ LinkedIn RSS Defining Active vs . Passive OSINT Though the open web is typically

  • Where To Go From Here The Privacy Blog

    Updated: 2021-03-21 22:49:28
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Where To Go From Here November 26, 2018 by Lance Cottrell I am not posting to The Privacy Blog as often as I did in the past . That does not mean I have stopped writing Please check out my blogs at Obscura.com and at Ntrepid Those will also include links to articles I have written , recorded webinars , conference talks , and . more November 26, 2018 Lance Cottrell Newer Older Privacy Policy

  • The End of an Era The Privacy Blog

    Updated: 2021-03-21 22:49:23
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The End of an Era October 25, 2018 by lance in Announcements Anonymizer I founded Anonymizer Inc . in 1995, almost 23 years ago . It was born of my passion and commitment to privacy , security , and anonymity . I deeply appreciate the support , encouragement , and loyalty from the millions of people who have used the service over the years . I am profoundly proud of what this company has accomplished . We were the first commercial internet privacy service in the world . We created the Kosovo Privacy Project , provided censorship circumvention services to hundreds of thousands of people in China and Iran , and worked with numerous human rights groups to provide protected communications and safe access to

  • The Privacy Blog

    Updated: 2021-03-21 22:49:20
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The End of an Era October 25, 2018 by lance in Announcements Anonymizer I founded Anonymizer Inc . in 1995, almost 23 years ago . It was born of my passion and commitment to privacy , security , and anonymity . I deeply appreciate the support , encouragement , and loyalty from the millions of people who have used the service over the years . I am profoundly proud of what this company has accomplished . We were the first commercial internet privacy service in the world . We created the Kosovo Privacy Project , provided censorship circumvention services to hundreds of thousands of people in China and Iran , and worked with numerous human rights groups to provide protected communications and safe access to

  • The Privacy Blog

    Updated: 2021-03-21 22:49:18
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The End of an Era October 25, 2018 by lance in Announcements Anonymizer I founded Anonymizer Inc . in 1995, almost 23 years ago . It was born of my passion and commitment to privacy , security , and anonymity . I deeply appreciate the support , encouragement , and loyalty from the millions of people who have used the service over the years . I am profoundly proud of what this company has accomplished . We were the first commercial internet privacy service in the world . We created the Kosovo Privacy Project , provided censorship circumvention services to hundreds of thousands of people in China and Iran , and worked with numerous human rights groups to provide protected communications and safe access to

  • The End of an Era The Privacy Blog

    Updated: 2021-03-21 22:49:16
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The End of an Era October 25, 2018 by lance in Announcements Anonymizer I founded Anonymizer Inc . in 1995, almost 23 years ago . It was born of my passion and commitment to privacy , security , and anonymity . I deeply appreciate the support , encouragement , and loyalty from the millions of people who have used the service over the years . I am profoundly proud of what this company has accomplished . We were the first commercial internet privacy service in the world . We created the Kosovo Privacy Project , provided censorship circumvention services to hundreds of thousands of people in China and Iran , and worked with numerous human rights groups to provide protected communications and safe access to

  • Seriously Tinder cleartext in 2018 The Privacy Blog

    Updated: 2021-03-21 22:49:16
    , The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Seriously Tinder , cleartext in 2018 January 24, 2018 by lance in Stupidity When I think about security and privacy , I often focus on sophisticated attacks and exotic exploits , or on user error and social engineering . A recent report about the security design of Tinder reminds me that we need to also keep an eye out for someone just leaving the door unlocked and wide . open Tinder does not encrypt the connection between your phone and its servers when sending photos back and forth . Anyone in a position to see your network traffic , like on a public WiFi , could see and potentially modify those photos . Additionally , even the encrypted communications leave patterns that an attacker can recognize . The

  • The Privacy Blog

    Updated: 2021-03-21 22:49:15
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Seriously Tinder , cleartext in 2018 January 24, 2018 by lance in Stupidity When I think about security and privacy , I often focus on sophisticated attacks and exotic exploits , or on user error and social engineering . A recent report about the security design of Tinder reminds me that we need to also keep an eye out for someone just leaving the door unlocked and wide . open Tinder does not encrypt the connection between your phone and its servers when sending photos back and forth . Anyone in a position to see your network traffic , like on a public WiFi , could see and potentially modify those photos . Additionally , even the encrypted communications leave patterns that an attacker can recognize . The

  • Tinder 27 s Lack of Encryption Lets Strangers Spy on Your Swipes WIRED Menu Story Saved Close Chevro

    Updated: 2021-03-21 22:49:14
    Skip to main content Open Navigation Menu Menu Story Saved To revist this article , visit My Profile , then View saved stories Close Alert Close Tinder 27 s Lack of Encryption Lets Strangers Spy on Your Swipes Backchannel Business Culture Gear Ideas Science Security More Chevron Story Saved To revist this article , visit My Profile , then View saved stories Close Alert Close Sign In Search Search Backchannel Business Culture Gear Ideas Science Security Andy Greenber g Security 01.23.2018 09:00 AM Tinder's Lack of Encryption Lets Strangers Spy on Your Swipes Thanks to Tinder's patchwork use of HTTPS , researchers found they could reconstruct someone's entire experience in the . app Facebook Twitter Email Save Story To revist this article , visit My Profile , then View saved stories Mai

  • Checkmarx Application Security Testing and Static Code Analysis Checkmarx Application Security

    Updated: 2021-03-21 22:49:13
    Checkmarx Launches Infrastructure as Code Scanning Solution to Secure Cloud-Native Applications : KICS Learn More Skip to content English German Home Products Products Software Security Platform CxSAST CxSCA CxIAST CxCodebashing Software Security Platform The industry†s most comprehensive software security platform that unifies with DevOps and provides static and interactive application security testing , software composition analysis and application security training and skills development to reduce and remediate risk from software . vulnerabilities Download Datasheet Checkmarx Rated highest for DevOps DevSecOps use case Get the Report Static Application Security Testing SAST Make custom code security testing inseparable from . development Download Datasheet Gartner Names Checkmarx a

  • No title

    Updated: 2021-03-21 22:49:11
    JavaScript is not . available We†ve detected that JavaScript is disabled in this browser . Please enable JavaScript or switch to a supported browser to continue using twitter.com . You can see a list of supported browsers in our Help . Center Help Center Terms of Service Privacy Policy Cookie Policy Imprint Ads info © 2021 Twitter , Inc . Something went wrong , but don†t fret — let†s give it another . shot

  • Seriously Tinder cleartext in 2018 The Privacy Blog

    Updated: 2021-03-21 22:49:09
    , The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Seriously Tinder , cleartext in 2018 January 24, 2018 by lance in Stupidity When I think about security and privacy , I often focus on sophisticated attacks and exotic exploits , or on user error and social engineering . A recent report about the security design of Tinder reminds me that we need to also keep an eye out for someone just leaving the door unlocked and wide . open Tinder does not encrypt the connection between your phone and its servers when sending photos back and forth . Anyone in a position to see your network traffic , like on a public WiFi , could see and potentially modify those photos . Additionally , even the encrypted communications leave patterns that an attacker can recognize . The

  • The Looming End of Network Neutrality and How to Protect Yourself The Privacy Blog

    Updated: 2021-03-21 22:49:08
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The Looming End of Network Neutrality and How to Protect Yourself December 13, 2017 by lance in Uncategorized Let†s get this out right up front . I am a strong advocate for network . neutrality ISPs like Comcast say that these regulations strangle innovation , and that all the concerns about how they might abuse their position are just . paranoia First a quick review . Network Neutrality is the principle that ISPs should not discriminate between the different sources of traffic on their network . My YouTube , your Facebook , his BitTorrent , her porn site , all should have the same access to , and performance on , the internet . In effect , the internet is like water or electricity , a utility delivered to

  • The Privacy Blog

    Updated: 2021-03-21 22:49:07
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The Looming End of Network Neutrality and How to Protect Yourself December 13, 2017 by lance in Uncategorized Let†s get this out right up front . I am a strong advocate for network . neutrality ISPs like Comcast say that these regulations strangle innovation , and that all the concerns about how they might abuse their position are just . paranoia First a quick review . Network Neutrality is the principle that ISPs should not discriminate between the different sources of traffic on their network . My YouTube , your Facebook , his BitTorrent , her porn site , all should have the same access to , and performance on , the internet . In effect , the internet is like water or electricity , a utility delivered to

  • Comcast really does block BitTorrent traffic after all The Iconoclast politics law and technology CN

    Updated: 2021-03-21 22:49:06
    , , The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Comcast really does block BitTorrent traffic after all The Iconoclast politics , law , and technology CNET News.com October 27, 2007 by lance in Internet Comcast really does block BitTorrent traffic after all The Iconoclast politics , law , and technology CNET News.com Here is another example of the fallacy of The Internet as a single entity . In many ways the Internet is like a hologram . What you see depends on where you are . Many web sites will charge higher prices to you if you are coming from certain countries or certain zip codes . In this case , certain kinds of communications simply don't work if you are a Comcast . customer The problem here is really informed consent , or false advertising . Users

  • Comcast caught hijacking web traffic Ryan Kearney

    Updated: 2021-03-21 22:49:04
    hello Home Blog 2 minutes Comcast caught hijacking web traffic On November 20th , 2012 Comcast hijacked my HTTP traffic and re-routed it through their own servers , injecting a notice on the page before completing the request . What this means is instead of my web request being routed to the website I wanted to visit , Comcast took it upon themselves to hijack my web traffic , forcing it to go through their servers instead . This poses a massive security risk for users since there's no telling what type of logging Comcast uses on their end . Why did they do all this To force a courtesy notice on every webpage I visit until I logged into my Comcast account because I was within 90 of my new 300GB limit In my testing I discovered that this only affects HTTP traffic and not HTTPS traffic .

  • The Privacy Blog

    Updated: 2021-03-21 22:48:57
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The Looming End of Network Neutrality and How to Protect Yourself December 13, 2017 by lance in Uncategorized Let†s get this out right up front . I am a strong advocate for network . neutrality ISPs like Comcast say that these regulations strangle innovation , and that all the concerns about how they might abuse their position are just . paranoia First a quick review . Network Neutrality is the principle that ISPs should not discriminate between the different sources of traffic on their network . My YouTube , your Facebook , his BitTorrent , her porn site , all should have the same access to , and performance on , the internet . In effect , the internet is like water or electricity , a utility delivered to

  • The Privacy Blog

    Updated: 2021-03-21 22:48:54
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The Looming End of Network Neutrality and How to Protect Yourself December 13, 2017 by lance in Uncategorized Let†s get this out right up front . I am a strong advocate for network . neutrality ISPs like Comcast say that these regulations strangle innovation , and that all the concerns about how they might abuse their position are just . paranoia First a quick review . Network Neutrality is the principle that ISPs should not discriminate between the different sources of traffic on their network . My YouTube , your Facebook , his BitTorrent , her porn site , all should have the same access to , and performance on , the internet . In effect , the internet is like water or electricity , a utility delivered to

  • The Privacy Blog

    Updated: 2021-03-21 22:48:53
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The Looming End of Network Neutrality and How to Protect Yourself December 13, 2017 by lance in Uncategorized Let†s get this out right up front . I am a strong advocate for network . neutrality ISPs like Comcast say that these regulations strangle innovation , and that all the concerns about how they might abuse their position are just . paranoia First a quick review . Network Neutrality is the principle that ISPs should not discriminate between the different sources of traffic on their network . My YouTube , your Facebook , his BitTorrent , her porn site , all should have the same access to , and performance on , the internet . In effect , the internet is like water or electricity , a utility delivered to

  • The Looming End of Network Neutrality and How to Protect Yourself The Privacy Blog

    Updated: 2021-03-21 22:48:48
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The Looming End of Network Neutrality and How to Protect Yourself December 13, 2017 by lance in Uncategorized Let†s get this out right up front . I am a strong advocate for network . neutrality ISPs like Comcast say that these regulations strangle innovation , and that all the concerns about how they might abuse their position are just . paranoia First a quick review . Network Neutrality is the principle that ISPs should not discriminate between the different sources of traffic on their network . My YouTube , your Facebook , his BitTorrent , her porn site , all should have the same access to , and performance on , the internet . In effect , the internet is like water or electricity , a utility delivered to

  • Fighting cybercrime vs protecting citizens The Privacy Blog

    Updated: 2021-03-21 22:48:47
    . The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Fighting cybercrime vs . protecting citizens May 09, 2017 by lance in Musings David Shedd , former director of the Defense Intelligence Agency , recently published an OpEd on the damage that unrestricted focus on catching criminals can do to our general cyber security . It is great to see people with that kind of background speaking on on this critical . issue Americans want their cyber data to be safe from prying eyes . They also want the government to be able to catch criminals . Can they have both It's an especially pertinent question to ask at a time when concerns over Russian hacking are prevalent . Can we expose lawbreakers without also putting law-abiders at greater risk After all , the same iPhone

  • The Privacy Blog

    Updated: 2021-03-21 22:48:44
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Fighting cybercrime vs . protecting citizens May 09, 2017 by lance in Musings David Shedd , former director of the Defense Intelligence Agency , recently published an OpEd on the damage that unrestricted focus on catching criminals can do to our general cyber security . It is great to see people with that kind of background speaking on on this critical . issue Americans want their cyber data to be safe from prying eyes . They also want the government to be able to catch criminals . Can they have both It's an especially pertinent question to ask at a time when concerns over Russian hacking are prevalent . Can we expose lawbreakers without also putting law-abiders at greater risk After all , the same iPhone that

  • Cookies Jisc

    Updated: 2021-03-21 22:48:40
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Website information Cookies : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Cookies amp amp amp amp amp lt section class= article-full__cookie-box article-full__cookie-box--no-js jsCookieBox amp amp amp amp amp gt amp amp amp amp amp lt h2 class= article-full__cookie-box-title amp amp amp amp amp gt Your settings : amp amp amp amp amp amp lt h2 amp amp amp amp amp gt amp amp amp amp amp lt p class=

  • Intute Jisc

    Updated: 2021-03-21 22:48:40
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Website information Legacy content Intute : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Intute The Intute site closed in July 2011. Archive Details of the project behind Intute can be found on the UK web : archive Intute repository search project Intute Jisc digitisation dissemination project You may also like Generic Archived events Generic Jisc strategies archive You are : in Website information

  • Fighting cybercrime vs protecting citizens The Privacy Blog

    Updated: 2021-03-21 22:48:39
    . The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Fighting cybercrime vs . protecting citizens May 09, 2017 by lance in Musings David Shedd , former director of the Defense Intelligence Agency , recently published an OpEd on the damage that unrestricted focus on catching criminals can do to our general cyber security . It is great to see people with that kind of background speaking on on this critical . issue Americans want their cyber data to be safe from prying eyes . They also want the government to be able to catch criminals . Can they have both It's an especially pertinent question to ask at a time when concerns over Russian hacking are prevalent . Can we expose lawbreakers without also putting law-abiders at greater risk After all , the same iPhone

  • Intute Jisc

    Updated: 2021-03-21 22:48:39
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Website information Legacy content Intute : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Intute The Intute site closed in July 2011. Archive Details of the project behind Intute can be found on the UK web : archive Intute repository search project Intute Jisc digitisation dissemination project You may also like Generic Archived events Generic Jisc strategies archive You are : in Website information

  • Jisc

    Updated: 2021-03-21 22:48:39
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content Jisc banner Powering world-class education and research Search Clear search results Popular tasks Coronavirus COVID-19 advice and information for members How we can help Cloud Consultancy , support and reseller of services Connectivity Connection services and infrastructure Cyber security Protecting the network and your organisation Data and analytics Address strategic challenges through data Libraries , learning resources and research Shared services , infrastructure and advice Student experience Tools to enrich learning and employability Trust and identity Manage access efficiently and effectively

  • Website information Jisc

    Updated: 2021-03-21 22:48:39
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Website information : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Website information Popular questions I've spotted a mistake who do I talk to Can I use your content Where can I find old content Explore this section Accessibility statement See the standards we're trying to reach with this website , and how to let us know if you spot a problem Privacy notice How and why Jisc may process your

  • Legacy content Jisc

    Updated: 2021-03-21 22:48:38
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Website information Legacy content : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Legacy content Information about former Jisc service sites as well as services , which have merged with Jisc . Archived services and content You can  visit the UK Web Archive to view old versions of our . site We have also listed some of our archived services and content . below Jisc Advance Jisc Content Jisc Digital

  • Cookies Jisc

    Updated: 2021-03-21 22:48:38
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Website information Cookies : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Cookies amp amp amp amp amp lt section class= article-full__cookie-box article-full__cookie-box--no-js jsCookieBox amp amp amp amp amp gt amp amp amp amp amp lt h2 class= article-full__cookie-box-title amp amp amp amp amp gt Your settings : amp amp amp amp amp amp lt h2 amp amp amp amp amp gt amp amp amp amp amp lt p class=

  • Privacy notice Jisc

    Updated: 2021-03-21 22:48:38
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Website information Privacy notice : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Privacy notice Jisc may process your personal data : because We need it to provide you with a service you’ve requested If you don’t provide us with the required personal data , we’ll try to provide the service , but it may be . impossible We’ll keep your data whilst it’s needed to deliver the service , and for an

  • Using our content Jisc

    Updated: 2021-03-21 22:48:38
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Website information Using our content : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Using our content We allow our website and its contents to be reused under the terms of a  Creative Commons Licence CC BY-NC-ND This means you may Copy , distribute and display our content But you must Acknowledge the source and author Not use it for commercial purposes Not alter , transform , or build upon the

  • Feedback errors and broken pages Jisc

    Updated: 2021-03-21 22:48:38
    , We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Website information Feedback , errors and broken pages : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Feedback , errors and broken pages If you'd like to send us feedback about the site , or if you've found something wrong then please email the web : team at web jisc.ac.uk Thank you for taking the time to let us know . We will try to get back to you as soon as . possible You may also like Generic

  • Archived events Jisc

    Updated: 2021-03-21 22:48:37
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Archived events : Utilities Search this website Disabled site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Archived events Archive Visit the UK Web Archive to view our archived events Up to date Alternatively view upcoming events , and recordings and resources from many of our past events You may also like Generic Annual reports archive Generic Jisc strategies archive You are : in Archived events Give feedback Areas Connectivity Cyber security Cloud Data and analytics Libraries , learning resources and

  • Jisc strategies archive Jisc

    Updated: 2021-03-21 22:48:36
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Website information Legacy content Jisc strategies archive : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Jisc strategies archive Archive Visit web archives to view : Jisc strategy for 2013-2016 via Internet Archive Wayback Machine Jisc strategy for 2010-2012 via UK Web Archive All Jisc strategies from 1996 to 2009 via UK Web Archive Up to date Jisc vision , mission and strategy Alternatively view

  • Connectivity Jisc

    Updated: 2021-03-21 22:48:31
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Connectivity : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Janet IP connection Intersite connection Netpath Managed router service Cloud connect AWS Cloud connect Google Cloud connect Microsoft Microsoft Azure ExpressRoute Govroam Network equipment framework Global connect Global education access framework eduroam eduroam Visitor Access Public wifi DPS Connectivity Meeting your connectivity needs with our world-class Janet Network and special purpose connections . We can

  • Cyber security Jisc

    Updated: 2021-03-21 22:48:31
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Cyber security : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Allow and deny lists BS 31111 audit and assessment Critical services protection Cyber Essentials Cyber security assessment Cyber security financial X-ray CSIRT Foundation DDoS mitigation Email advice and testing Janet Network resolver Network time service NTP Managed SIEM Penetration testing Primary nameserver service Security operations centre Simulated phishing and associated training Splunk Web filtering and

  • Data and analytics Jisc

    Updated: 2021-03-21 22:48:30
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Data and analytics : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Learning analytics Checkin+ Data Consultancy Discovery and consultancy HE Impact : Local Level report Heidi Plus Online surveys Tailored Datasets Data and analytics Trusted higher and further education data and analysis helping you to make data-driven decisions and gain valuable insights . nbsp Analytics for teaching and learning Empower your tutors to transform your student experience with learning

  • Libraries learning resources and research Jisc

    Updated: 2021-03-21 22:48:30
    , We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Libraries , learning resources and research : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Library support Open research Learning and research resources Libraries , learning resources and research Providing shared services , infrastructure and advice to help you manage your library resources , research publication lifecycle and research . outputs Library support Providing you with centrally-maintained library services to save you time and money across the information

  • Student experience Jisc

    Updated: 2021-03-21 22:48:29
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Student experience : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Building digital capability Digital experience insights Prospects Prospects Hedd Prospects Luminate Student experience Supporting you with digital tools and mechanisms to enrich the learning and teaching experience for your students on campus and in the work place . nbsp Student and graduate services Help with developing the digital skills of your staff and students , plus support and opportunities for

  • Trust and identity Jisc

    Updated: 2021-03-21 22:48:28
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Trust and identity : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Certificate service Domain registry OpenAthens Student voter registration Trust and identity consultancy UK Access Management Federation Trust and identity These world-leading services help you manage access efficiently and . effectively Supporting you with verification If you need a way to verify data , or the status of staff and students you're responsible for , nbsp we can help you choose a service with

  • Advice and guidance Jisc

    Updated: 2021-03-21 22:48:28
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Advice and guidance : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Consultancy Training Guides Advice and guidance Providing you with expert consultancy , trusted advice and impactful training Coronavirus COVID-19 advice and information for members We’ll work with you to understand your needs From updating your digital skills to improving your organisation's infrastructure and making strategic changes , we can help you to feel more confident in education's changing

  • Guides Jisc

    Updated: 2021-03-21 22:48:28
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Advice and guidance Guides Guides : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Consultancy Training Guides Guides Showing 75 current guides Include archived guides Refine : Sort Sort by Last updated Most viewed Relevance A-Z Z-A Refine Cancel Refined by Search Search guides Close search results Topic Accessibility 11 Assessment 5 Cloud 3 Collaboration 3 Content 5 Course data 2 Data and analytics 5 Digital literacy 11 Infrastructure 8 Learning and teaching 15 Legal 11

  • Training Jisc

    Updated: 2021-03-21 22:48:28
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Advice and guidance Training : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Consultancy Training Training terms and conditions Guides Training Developed and delivered by our experts , our high-quality training is designed to help you develop in-house expertise and make the most of our services and solutions . nbsp Browse courses by topic or jump to full course schedule Cyber security Helping you protect the network and your organisation Featured : courses Cyber Essentials

  • Consultancy Jisc

    Updated: 2021-03-21 22:48:28
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Advice and guidance Consultancy : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Consultancy Training Guides Consultancy Expert support and practical assistance to help you transform your organisation and practice through digital . technologies How we can help Our members have access to advice from our sector experts across Jisc . nbsp Impartial advice and support can enable you to identify issues , select solutions and find an optimal . outcome We know the challenges on

  • Events Jisc

    Updated: 2021-03-21 22:48:28
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Events : Utilities Search this website Disabled site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Events Event Shaping a digital culture in higher education , 23 March 2021 During 2020, learning and teaching reimagined identified many challenges for higher education . This event brings people together to explore ways of turning conversations about digital practice and culture change into specific actions . Event Networkshop49, 27-29 April 2021 Our conference returns online , equipping you with the latest

  • R Jisc

    Updated: 2021-03-21 22:48:27
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in R D : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Projects How we innovate R D Working with you to identify emerging technologies and develop them into the services you . need Find a project Take a look at what we're working on and find out more about services that are currently in . development See all R D projects How do we innovate Our co-design approach to R D is steered by the priorities of our members . Explore how we develop ideas and scale them up to benefit the

  • About us Jisc

    Updated: 2021-03-21 22:48:27
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in About us : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Who we are and what we do Corporate information Savings and value Our history Public affairs About us We provide digital solutions for UK education and . research Our vision is for the UK to be the most digitally-advanced higher education , further education and research nation in the . world We provide UK universities and colleges with shared digital infrastructure and services , such as the superfast Janet Network

  • Membership Jisc

    Updated: 2021-03-21 22:48:27
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Take our short survey to help us improve the site start the survey Skip to main content You are : in Membership : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation FE catalogue FE subscription HE catalogue HE subscription Alternative providers Cost sharing group Member stories Membership What's included Further education Higher education Alternative providers Find out about changes to our further education funding England only Your subscription is funded by the HE funding bodies and your contribution You can

  • Get involved Jisc

    Updated: 2021-03-21 22:48:27
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Get involved : Utilities Search this website Disabled site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Get involved Current opportunities for you to be a part of our . work edtech launchpad Competition to find technology solutions to improve education Creative Commons attribution information Pink and blue lights abstract image Shahadat Rahman via Unsplash Take part in our step up programme Building a community of innovators supporting long-term change in UK education . Part of our edtech programme Join a

  • News Jisc

    Updated: 2021-03-21 22:48:26
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in News : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Blog Podcasts All news Sign up to our newsletter News Sign up for updates Technology in education is a vital part of the journey into the workplace’ 16 March 2021 Creative Commons attribution information Two students walking to class , holding digital devices SDI Productions via Getty Images All rights reserved Technology in education is a vital part of the journey into the workplace’ 16 March 2021 Rachel Bruce , head of

  • Jobs Jisc

    Updated: 2021-03-21 22:48:26
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in Jobs : Utilities Search this website Disabled site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Jobs Working for us Our people are at the heart of our success and we are always looking for talented and committed people to join . us We have opportunities in a range of fields from cyber security , penetration testers , account managers , communications and marketing specialists , trust and identity experts to network . engineers You can look forward to a rewarding job with opportunities to develop and make a

  • Sign up to our newsletter Jisc

    Updated: 2021-03-21 22:48:26
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks That's fine Skip to main content You are : in News Sign up to our newsletter : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Blog Podcasts All news Sign up to our newsletter Sign up to our newsletter Sign up to Headlines , our fortnightly newsletter for all the latest news , guidance and events tailored to . you After you register , we’ll send you an email so that you can pick the areas that interest you most for your bespoke . edition Javascript is currently disabled , please enable it to use the form . Alternatively

  • No title

    Updated: 2021-03-21 22:48:25
    JavaScript is not . available We†ve detected that JavaScript is disabled in this browser . Please enable JavaScript or switch to a supported browser to continue using twitter.com . You can see a list of supported browsers in our Help . Center Help Center Terms of Service Privacy Policy Cookie Policy Imprint Ads info © 2021 Twitter , Inc . Something went wrong , but don†t fret — let†s give it another . shot

Previous Months Items