Wednesday, December 7, 2022
dismantling of neutrality regulations

Net Neutrality and The Dismantling of Regulations

On December 14th, the Federal Communication Commission (FCC) is set to vote on whether or not to dismantle the regulations put in place in February 2015 by the Obama administration.  This...
Facial Recognition Privacy Regulation

Why facial recognition systems should be regulated

Chris Middleton reports on a complex debate as the US considers putting legal restrictions on facial recognition systems. Moves are afoot in the US to regulate facial recognition technology. This month, two...
Nth party

The Nth party: compliance with anti-bribery and corruption laws

For Fortune Global 1000 companies with complex global footprints and multiple third party affiliations, compliance with cybersecurity regulations, including anti-bribery and corruption laws, is a challenge. Global supply chains are inevitably...
Fake Websites

Hackers Running Fake Websites To Mimic Major UK Banks

American Cyber Security firm Domain Tools has recently warned that hackers are currently using hundreds of fake websites to mimic major UK banks in order to obtain personal information and the...
Network Security

Network Vulnerability: Ensuring security from a variety of threats

With the new year and new security threats being added to the list of existing ones, the IT world is increasingly pushing to prioritize security, high availability, and disaster recovery for...

Tracking, Privacy, and Frauds: How The Peer Economy Makes Fakery Pointless

There’s a pervasive scam going on in IT. You mention in an email to a friend how you wish you were on a tropical island vacation, only to be inundated with...

How to Avoid a Gulag Lockdown in Your Cloud Vendor Choices

Aleksandr Solzhenitsyn shocked the western world about the conditions in Siberian prison camps in his three volume expose titled The Gulag Archipelago in the mid 20th century. The books ripped through...
Judy

JUDY WHO?

Last month’s ransomware attack “WannaCry” locked out many computers across the world and spread chaos in the hospitality and banking sector. One would have thought that internet security agents would have...
Phishing

Phishing for the Big One

Phishing has usually been consigned to Nigerian princes and retirees who had no idea about technology. Those duped by these scams have traditionally been the laughing stock of the tech world,...
microsoft hydra

Windows bugs have come to resemble the Hydra of Ancient Mythology

The Lernaean Hydra in Roman mythology was a frightening beast. It had seven snake heads. If a warrior cut off one of the heads, it simply regrew while the others continued...

LATEST NEWS

MUST READ