The Bad Batch: Tantiss base security
Cybersecurity measures of Tantiss base as depicted in the third season of “Star Wars: The Bad Batch”
27 articles
Cybersecurity measures of Tantiss base as depicted in the third season of “Star Wars: The Bad Batch”
As per tradition, on May 4, we review the status of cybersecurity in a galaxy far, far away.
How things stood with information security in a galaxy far, far away — nine years before the Battle of Yavin.
Our Danish colleague spilled a lot of cybersecurity ink in his works.
A look at what’s changed in the Matrix in the 18 years since the last update.
Even to the naked eye, the Matrix’s flawed implementation threatens the system’s stability and security.
What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity?
Examples of the cybersecurity technologies and practices of Durin’s folk abound in Tolkien’s Middle-earth.
The Galactic Empire’s heirs analyzed for cybersecurity.
Want to teach your kid the concept of cybersecurity? Start with Transformers: War for Cybertron Trilogy.
Would Johnny Mnemonic’s cybersecurity be plausible in the real 2021?
We examine the tale of Cinderella, one of the earliest stories that attempts to teach children basic cybersecurity principles.
We examine the first installment in the Die Hard series from a cybersecurity standpoint.
If we are to believe the science-fiction of the last century, the hackers of 2020 should have access to a rather curious toolkit.
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
It turns out that the tale of Ali Baba is a collection of stories from ancient Persia about … cyberthreats?
Hans Christian Andersen’s report on the Kai infection incident, and the investigation by infosec expert Gerda.