
TECH TUESDAY: The Mobile Phone ID Card – A Safe Alternative?
On Tech Tuesday, we focus many of our original columns on cybersecurity, but today’s op-ed is going to also touch on identity theft. Remaining…
Read MoreOn Tech Tuesday, we focus many of our original columns on cybersecurity, but today’s op-ed is going to also touch on identity theft. Remaining…
Read MoreWe share a lot of news on malware and threats because being armed with information is a good thing. When it comes…
Read MoreWith every tragedy comes opportunity. The opportunity to learn, to rebuild, to do things better, and to prove that people around the…
Read MoreBack in May of last year, the Internal Revenue Service was hacked. On the surface, it would be easy to say something snarky…
Read MorePersonal privacy in conjunction with Big Data use is a much-debated topic in every company and country – and rightly so. It is a…
Read MoreWe’re reaching the end of January, but before you know it, March will be upon us. For some, March means the end of winter…
Read MoreWere security experts right with their predictions? About this time last year, experts and analysts all placed their official predictions for the cyber threat…
Read MoreAccording to the Ponemon Institute’s 10th annual Cost of Data Breach Study, the average consolidated total cost of a data breach is now $6.53…
Read MoreSo we all know PayPal, but just in case you have never heard of the service or ever used it in the past, allow…
Read MoreOften when it comes to privacy and our daily lives, media outlets and political advocates warn that we may be destined to a society…
Read More