Security

Laptop

Cybersecurity: What You Need to Know for 2016

2015 was quite a year! Hacks and ransomware got personal. APT attacks and cybercrime-as-a service became widespread. The scary future of IoT hacking became a reality with the demonstration of self-driving car hacks. And, a new threat vector of mobile devices

Cybersecurity: What You Need to Know for 2016 Read More »

binary

Weakened Encryption Will Cause Compliance Chaos

There has been increasing demand from government and law enforcement in recent months for some sort of encryption backdoor. The theory–whether grounded in reality or not–is that an encryption backdoor will allow intelligence agencies to detect and prevent more terrorist

Weakened Encryption Will Cause Compliance Chaos Read More »

Eyeball

Biometrics: Physical Attributes vs. Behavioral Patterns – The Privacy Debate

Account takeovers are increasingly affecting a growing population of online user accounts due to a confluence of threats, such as weak consumer password practices, frequent mass data breaches and brute force attacks against web properties. The scope, scale and frequency

Biometrics: Physical Attributes vs. Behavioral Patterns – The Privacy Debate Read More »

Scroll to Top