Nth party

The Nth party: compliance with anti-bribery and corruption laws

For Fortune Global 1000 companies with complex global footprints and multiple third party affiliations, compliance with cybersecurity regulations, including anti-bribery and corruption laws, is a challenge. Global supply chains are inevitably...
Honeypot security

Like Bees To Honey – How Honeypot Security Can Save Your Network

A new and proactive solution to protecting networks from attack, both external and internal, is to deploy a honeypot security system within the network. These systems have the capability to immediately...
IoT Deployment

IoT Deployment Optimization – EPID Identity

Over the next few years, an estimated 30 to 50 billion smart devices are expected to hit the IoT and EoT markets, all connected to various systems. With each device having...
software bug bounty hunting

A New Type of Bounty Hunter: Google Pays Millions To Find Software Bugs

There’s a new type of bounty hunter out there. The payoff is great, the skill set is limited, and the hunted are bugs. Bounty hunting and the future have officially collided....
May demanded social responsibility

Tech companies’ social responsibility advocated in UK PM’s speech

UK prime minister Theresa May demanded social responsibility for tech companies to filter illegal content, she said on Thursday afternoon. Speaking at the World Economic Forum in Davos, Switzerland, May demanded...
controversy regarding net neutrality

Net Neutrality, What Happened And What Is Happening?

On Thursday, December 14th the Federal Communications Commission (FCC) voted to eliminate specific regulations on the Internet that had been implemented by the Obama administration in 2015.This vote has ignited a...
dismantling of neutrality regulations

Net Neutrality and The Dismantling of Regulations

On December 14th, the Federal Communication Commission (FCC) is set to vote on whether or not to dismantle the regulations put in place in February 2015 by the Obama administration.  This...
Big Tweet is Watching You

#BigTweetisWatchingYou

In 1949, George Orwell introduced the famous phrase that causes the innate spine-tingling fear of an authoritarian, censoring, Stalinist, dictatorial, police state: “Big Brother is watching you.”  For some reason, in...
SVR tracking

What Stephen King’s “It” Can Teach Us About Cyber Breaches

Everyone has a different tolerance level for scary movies. The strong of heart all flocked to the theater this past weekend to see Stephen King’s “It”, which made 117.2 million dollars...
Instagram Security

Watch Where You Scroll

Even seemingly secure apps like Instagram are subject to cybersecurity threats. That’s the takeaway from a recent report stating that hackers were able to gain unlawful access to high profile Instagram...

LATEST NEWS

MUST READ