Jacob Appelbaum's opening remarks at the World Forum for Democracy 2015, posted November 20th, should be required viewing on the internet today as the power brokers of the world meet in Paris to discuss climate catastrophe shadowed by terrorism.
I did not want to be so dramatic, but I could not help but be completely honest as well. The end possibility is that your entire organization may suffer the fate of Sony Pictures, target, Anthem and others who have been shaken by hacks and vulnerabilities in their networks.
It is difficult to think of two issues with a greater potential to negatively impact both our environment and the global economy than climate change a...
Every day criminals are finding new ways to compromise devices and steal identities. While consumers understand this, many still don't take the necessary precautions to stay safe. Next time you think about casting security aside and sharing your password with a friend, imagine what you could do with an extra $300.
The November 13 attacks in Paris were tragic, and our hearts and thoughts are with the people of Paris. We stand ready to work with law enforcement to prevent future such horrific incidents.
A couple of years ago when some 40 million credit cards were breached at Target's brick-and-mortar stores, I frantically tried to recall if I had done any holiday shopping at my neighborhood store. Thankfully I hadn't, but my relief was short-lived.
Encryption, a process that scrambles communications, allows only those with the decryption key to read one's messages. An encrypted message looks like random alphanumeric gibberish to the human eye. The longer the key, the more time and computer power it requires to unscramble.
In 2015, somewhere in the neighborhood of 1 billion Internet of Things (IoT) devices will be purchased, an increase of 60 percent over the previous year. There will be 10 billion IoT devices connected to the Internet this year.
The man-in-the-middle attack is a tricky one for consumers because most of the time victims don't even know they've been hacked. It's a silent attack and hard to detect unless you know what you're looking for.
To really hide online, you need to do it in plain sight. That means you will have to create an entire fake online persona -- on Facebook. Google, Twitter, even LinkedIn -- using this identity. Do not link any of those accounts to your actual identity or your real email address.
As someone who works in the cybersecurity industry, I know that the November to December timeframe is when many consumers and businesses will get hacked or defrauded. In many ways, the holiday season is an ideal time for cybercriminals.
A few weeks ago I wrote this piece about #IOT Cybersecurity and how it affects personal and brand reputations. I got a lot of criticism for basically speaking the truth.
I was shocked to learn that my U.S. Senator, Johnny Isakson, made the list. Could the legislator, one of the most respected members of the Senate and the state of Georgia, be a secret Klansman?
A rekindled multi-stakeholder dialogue is needed to help clarify global privacy standards and flesh out the right to privacy mentioned in both the 1948 Universal Declaration of Human Rights and the 1966 International Covenant on Civil and Political Rights (ICCPR).
The meeting point for hackers and mothers is like a mirror. The outward-bound reflection is where they intersect. Both are interested in what is revealed by a hack or sneak attack, but for the opposite reason.
October 1st was supposed to be a transition day for U.S. businesses with respect to credit cards. With a few exceptions like autopay gas pumps, credit card transactions were scheduled to be switched to the EMV method of payment processing.