iOS app Android app

Information Security

Do the Pokémon Go: Information Security in the Physical World

Daniel Garrie | Posted 07.13.2016 | Technology
Daniel Garrie

On July 6, 2016, Augmented Reality made a great leap forward with the release of Pokémon Go, a mobile game that allows players to interact with Poké...

Bootlegging, Piracy and the Modern Workforce Have Things in Common

Ian Khan | Posted 01.26.2016 | Technology
Ian Khan

There are serious correlations and similarities between smuggling alcohol, piracy in any form -- whether it is the real life bad guys on ghost ships in the seas or digital pirates who download stuff off the internet thinking it's all free while some artist starves to death.

Nigerians May Soon Have to Worry About Implanted Pacemaker Security

Utibe Effiong | Posted 06.02.2016 | Healthy Living
Utibe Effiong

Soon some of us will be enjoying the freedom granted by an Internet-enabled pacemaker. It would be good to have that without the heartache that comes with worrying about what a hacker might do in this new world of implanted Internet-connected medical devices.

Defense in-Depth Simplified

Richard La Bella | Posted 05.29.2016 | Technology
Richard La Bella

I like things simple. When things are simple they are easier to explain, document, implement, revise and manage. Take defense in-depth. Defense in-depth is a term, which means, security implemented in layers.

Don't Be the Weakest Link in Your Company's Cyber Security Plan

Richard La Bella | Posted 06.06.2015 | Technology
Richard La Bella

No matter how big or small your company is we all have something to protect. No matter how many layers of security we have in place, people continue to be the weakest link in their company's Cyber security plan.

Computer-frying "USB Killer:" A Trap to Destroy Your Laptop

Andrey Grehov | Posted 05.19.2015 | Technology
Andrey Grehov

"USB Killer" is a device, which can literally fry your computer. The device was hand-made by a Russian hacker, nicknamed as Dark Purple.

How to Keep Employees' Personal Details Secure

Robert Siciliano | Posted 11.12.2013 | Technology
Robert Siciliano

Beware! There are criminals in our midst. We can't see them, but they're around, waiting for our laptops, PCs or work computers to succumb to a virus ...

China's Military: Here We Are!

Christopher Burgess | Posted 07.10.2013 | Politics
Christopher Burgess

Do we listen to the DoD or to the PRC government and Senior Colonel Wang XinJun, a researcher at the Academy of Military Sciences in Beijing, who recently stated, "The Chinese government and armed forces have never sanctioned hacking activities"?

3 Key IT Trends That Will Drive Information Security Evolution

Steve Hamby | Posted 10.26.2011 | Technology
Steve Hamby

The information security evolution in the next 10 to 20 years will focus on three key areas: Infrastructure-Enhanced Security, Enhanced Threat Modeling and Semantic Security.

Most Companies Keeping Mum On Data Breaches

The Huffington Post | Amy Lee | Posted 05.28.2011 | Technology

For corporations, the threat of data breach is more dangerous than ever--but, according to a new study, most companies still do not take the measures ...

Former Intelligence Operative Talks About the Implications of WikiLeaks

Jonathan Bernstein | Posted 05.25.2011 | World
Jonathan Bernstein

The ongoing release of formerly secret U.S. government documents by WikiLeaks has hit home with me on multiple fronts: as a former military intelligen...