Cellphone displaying VPN logo

How to shield personal data from evil doers

1046
Digital privacy is practically a misnomer. The list of companies not hacked seems shorter than those attacked.  Dentin Waweru might not agree with the exaggeration, but cybersecurity is a concern. The software engineer and freelance...
Blog Image

The Next Era of Tech

1106
Quantum Computing. It seems like that is the BIGGEST buzzword after artificial intelligence. However, a lot of the resources I used to try to understand the concepts of quantum computing were difficult to understand quickly....
Blog Image

Cognitive Cyber Security

1326
As cyberattacks increase in scale and complexity, artificial intelligence (AI) helps resource-intensive security operations and analysts stay ahead of the threat. Artificial intelligence is changing the game by analyzing vast amounts of risk data...
Blog Image

Cybersecurity Is In Meltdown, Here’s A New Idea

993
Despite a decade of increasing investments in cybersecurity, never have organizations been more vulnerable. New approaches and thinking are urgently needed. For many companies, the cybersecurity strategy is to spend millions on security systems and...
Blog Image

Shor’s Algorithm: the bane of RSA

2027
RSA encryption is a public-key encryption system. This means it has a public key, accessible to all, and a private key which is kept private. The public key is used for encryption, and only...
The Clusit, Security Community, has published a report on the "state of the art" of the IoT phenomenon

Internet of Things and Clusit Report (part I)

1577
The Clusit, Security Community, has published a report on the "state of the art" of the IoT phenomenon, Internet of Things, which is quite interesting. As noted in the introduction, this phenomenon has become very...
Blog Image

How to Counter Data Breaches – Everything About Protecting Your Data

1003
As access to the internet has become a lot easier over the years, we have likewise witnessed an increase in data breaches. From the government and private firms down to individuals, pretty much everyone...
Blog Image

Global Trends in Fintech Technology

1744
Countries may have locked up their borders to mitigate the COVID-19 pandemic, but local and international trade must go on. Innovations such as cloud-based technology, AI, and fintech have stepped in to handle the...
Blog Image

The Futility (And Hope) Of Cybersecurity In Today’s Organizations

1565
Organizations continue to cast their unprotected and sensitive data around while spending millions on cybersecurity to keep it protected and contained. The result is a cybersecurity crisis that cripples individuals, companies and nations. One...
Blog Image

America Under Fire — US Gov. Solarium Cybersecurity Report Sounds The General Alarm

1275
A bi-partisan report sends a dire warning to be heeded by all Americans. The US is under sustained cyber-assault. Time to unite behind a common strategy. "Our national security is now inexorably linked to cybersecurity" -...
Blog Image

Top Safety Tips to Protect Yourself From Common Craigslist Scams

991
Online scams are thriving on e-commerce platforms as they provide various opportunities for creative and sophisticated fraudsters and cybercriminals. The popular classified advertising site, Craigslist, has not been able to escape their advances either,...
The IoT is «an interconnected environment in which all kinds of objects have a digital presence and the ability to communicate with other objects and people»

Questions and strategic objectives of the IoT

1093
The phenomenon of the Internet of Things is in full expansion, both for the multiplication of digital devices on the market and for their objective functionality and usefulness at the service of innovative and...
Machine Learning

Five Data Science and Machine Learning Trends That Will Define Job Prospects in 2020

6243
Data Science and ML have been one of the most talked-about trends in 2019 and without any surprise, they will continue to be so in 2020 as well. From shopping online, hailing rides, ordering food...
Blog Image

How PCI DSS Compliant Businesses Can Still Be Breached?

925
The recent Verizon PCI Compliance Report highlighted that there’s a link between PCI DSS-compliant organizations and their ability to ward off cyber-attacks. Even though PCI DSS got implemented more than 12 years ago, cybercriminals...
Blog Image

Why Encryption is Critical to Everyday Life?

1207
You type in passwords almost every single day, the most basic form of encryption used in your life. Yet the question remains: how safe is that password? Well if you happen to use a...
Blog Image

One Metro NY: A Privacy Disaster, or Convenience Win?

1060
It seems like every morning brings new headlines that herald the end of our digital privacy as we know it. These stories spark outcry, worry, and -- counterintuitively -- no small amount of apathy.  The...
Blog Image

Business Security Integration Trends to Invest in Now and Beyond

3167
In 2017, a report by Statistic Brain revealed that employee theft costs businesses about $50 billion every year, according to the CNBC website. Common security issues within an organization involve computer systems and customer information....
Security systems

How to Prevent Insider Data Breaches at your Business

1075
Security systems are installed within the premise of a workplace to avoid any external threats to the business. People often neglect that with keeping the external security intact, internal security is also a major...
Browse Anonymously

5 Simple Ways to Browse the Web Anonymously: 2019 Edition

1488
Browsing privately ensures that no one spies on what you do online. Thanks to the tech growth that the world has experienced over the years, you now choose to either browse the entire web...
Blog Image

15 Biggest Data breaches since 2003 & how can you protect yourself

3584
With more than 4 billion having internet access & using it on a daily basis, the security of your personal data becomes paramount with the exchange of massive amounts of data online these days....