Security

Laptop

Cybersecurity: What You Need to Know for 2016

2015 was quite a year! Hacks and ransomware got personal. APT attacks and cybercrime-as-a service became widespread. The scary future of IoT hacking became a reality with the demonstration of self-driving car hacks. And, a new threat vector of mobile devices

Cybersecurity: What You Need to Know for 2016 Read More »

binary

Weakened Encryption Will Cause Compliance Chaos

There has been increasing demand from government and law enforcement in recent months for some sort of encryption backdoor. The theory–whether grounded in reality or not–is that an encryption backdoor will allow intelligence agencies to detect and prevent more terrorist

Weakened Encryption Will Cause Compliance Chaos Read More »

Scroll to Top