Blog Image

Dear Citizen, blockchain will change your life!

2938
Blockchain can definitely affect social organizations. Can the new technology be used successfully in public administration as well? Will it help governments inspire trust in citizens and make the latter feel they are better...
Blog Image

Cybersecurity Is In Meltdown, Here’s A New Idea

1195
Despite a decade of increasing investments in cybersecurity, never have organizations been more vulnerable. New approaches and thinking are urgently needed. For many companies, the cybersecurity strategy is to spend millions on security systems and...
Blog Image

Shor’s Algorithm: the bane of RSA

2349
RSA encryption is a public-key encryption system. This means it has a public key, accessible to all, and a private key which is kept private. The public key is used for encryption, and only...
Blog Image

Four Grim Dreams of Great Technology

1551
The world has come to a point where life without the pervasive presence of technological gadgets is very hard to imagine. And yet, this technology-filled world is not immune to crises. Which of them...
Blog Image

How to Counter Data Breaches – Everything About Protecting Your Data

1322
As access to the internet has become a lot easier over the years, we have likewise witnessed an increase in data breaches. From the government and private firms down to individuals, pretty much everyone...
Blog Image

Cognitive Cyber Security

1843
As cyberattacks increase in scale and complexity, artificial intelligence (AI) helps resource-intensive security operations and analysts stay ahead of the threat. Artificial intelligence is changing the game by analyzing vast amounts of risk data...
Blog Image

Business Security Integration Trends to Invest in Now and Beyond

3336
In 2017, a report by Statistic Brain revealed that employee theft costs businesses about $50 billion every year, according to the CNBC website. Common security issues within an organization involve computer systems and customer information....
Blog Image

How PCI DSS Compliant Businesses Can Still Be Breached?

1140
The recent Verizon PCI Compliance Report highlighted that there’s a link between PCI DSS-compliant organizations and their ability to ward off cyber-attacks. Even though PCI DSS got implemented more than 12 years ago, cybercriminals...
Blog Image

Cybersecurity Non-profit to Help SME’s Fight Against Cybercrime

5499
A non-profit organization called Global Cyber Alliance (GCA) has vowed to improve one of the weakest links in cybersecurity by helping out small businesses. GCA has released a new toolkit containing free cybersecurity tools. Accompanying the...
Blog Image

The Lowest Cost & Most Effective Path to Better Cybersecurity

2390
The best and most overlooked action for robust cybersecurity might be the least expensive. Among the many challenges organizations face in 2020, cybersecurity (or the lack thereof) has dominated the news cycle. Ultra-sophisticated criminals are...
Machine Learning

Five Data Science and Machine Learning Trends That Will Define Job Prospects in 2020

6652
Data Science and ML have been one of the most talked-about trends in 2019 and without any surprise, they will continue to be so in 2020 as well. From shopping online, hailing rides, ordering food...
Blog Image

3 Ways to Protect Against Man-In-The-Middle Attacks

7109
A man-in-the-middle attack is one where both the client and the server are victims. The attacker sits virtually between both parties and intercepts communications between the two. Therefore, all information passed from one end...
Blog Image

15 Biggest Data breaches since 2003 & how can you protect yourself

3797
With more than 4 billion having internet access & using it on a daily basis, the security of your personal data becomes paramount with the exchange of massive amounts of data online these days....
Blog Image

Can De-Identification Protect Your Online Privacy?

1733
Introduction In the last few years, the global population has an increase in privacy concerns. After the Facebook scandal in the 2016 U.S election, people start to realize how valuable their data is. But is...
The Clusit, Security Community, has published a report on the "state of the art" of the IoT phenomenon

Internet of Things and Clusit Report (part I)

1844
The Clusit, Security Community, has published a report on the "state of the art" of the IoT phenomenon, Internet of Things, which is quite interesting. As noted in the introduction, this phenomenon has become very...
Blog Image

Protecting Against Insider Threat: A Novel Approach

1210
Organizations struggle with insider threats to their data security. Employees planning to leave their jobs are involved in 60% of insider cybersecurity incidents and data leaks, research suggests. Whether intentional or accidental, sensitive content...
Blog Image

Amazon venturing into emotionally-savvy Artificial Intelligence at the cost of your Privacy

4237
I am a tech junkie and all for using technology to improve our lives, but there is a dark side to all this tech invasion in our lives. Watching the movie "Snowden" or even...
Blog Image

One Metro NY: A Privacy Disaster, or Convenience Win?

1266
It seems like every morning brings new headlines that herald the end of our digital privacy as we know it. These stories spark outcry, worry, and -- counterintuitively -- no small amount of apathy.  The...
Blog Image

The Next Era of Tech

1382
Quantum Computing. It seems like that is the BIGGEST buzzword after artificial intelligence. However, a lot of the resources I used to try to understand the concepts of quantum computing were difficult to understand quickly....
Cellphone displaying VPN logo

How to shield personal data from evil doers

1268
Digital privacy is practically a misnomer. The list of companies not hacked seems shorter than those attacked.  Dentin Waweru might not agree with the exaggeration, but cybersecurity is a concern. The software engineer and freelance...