Thursday, January 17, 2019

Improving Network Security through the IoT

The What Since its inception the Internet of Things (IoT) has been labelled a security risk, with enormous challenges. However, data analytics firm MicroStrategy has taken a different stance on the seemingly...
Nth party

The Nth party: compliance with anti-bribery and corruption laws

For Fortune Global 1000 companies with complex global footprints and multiple third party affiliations, compliance with cybersecurity regulations, including anti-bribery and corruption laws, is a challenge. Global supply chains are inevitably...
IoT Deployment

IoT Deployment Optimization – EPID Identity

Over the next few years, an estimated 30 to 50 billion smart devices are expected to hit the IoT and EoT markets, all connected to various systems. With each device having...

Trump, Russia, and the Escalating Risks of Cyber Arms Race

Max Smart, the 60’s spy comedy hero, had a phone in his shoe and a camera to take photos of sensitive documents in a pen. While those technological advances have since...

How to Avoid a Gulag Lockdown in Your Cloud Vendor Choices

Aleksandr Solzhenitsyn shocked the western world about the conditions in Siberian prison camps in his three volume expose titled The Gulag Archipelago in the mid 20th century. The books ripped through...
software bug bounty hunting

A New Type of Bounty Hunter: Google Pays Millions To Find Software Bugs

There’s a new type of bounty hunter out there. The payoff is great, the skill set is limited, and the hunted are bugs. Bounty hunting and the future have officially collided....
May demanded social responsibility

Tech companies’ social responsibility advocated in UK PM’s speech

UK prime minister Theresa May demanded social responsibility for tech companies to filter illegal content, she said on Thursday afternoon. Speaking at the World Economic Forum in Davos, Switzerland, May demanded...
Honeypot security

Like Bees To Honey – How Honeypot Security Can Save Your Network

A new and proactive solution to protecting networks from attack, both external and internal, is to deploy a honeypot security system within the network. These systems have the capability to immediately...
dismantling of neutrality regulations

Net Neutrality and The Dismantling of Regulations

On December 14th, the Federal Communication Commission (FCC) is set to vote on whether or not to dismantle the regulations put in place in February 2015 by the Obama administration.  This...
Big Tweet is Watching You

#BigTweetisWatchingYou

In 1949, George Orwell introduced the famous phrase that causes the innate spine-tingling fear of an authoritarian, censoring, Stalinist, dictatorial, police state: “Big Brother is watching you.”  For some reason, in...

LATEST NEWS

MUST READ