The new year is a time for reflecting on the old and considering the new. In cybersecurity, this leads to a prediction-fest where vendors tell us what to expect over the next 12 months.
The end-of-year online buying season is a bank fraud frenzy. This used to be done by criminals using stolen or cloned payment cards in person, via card-present (CP) fraudulent transactions. The introduction of chip-based Europay, Mastercard, and Visa (…
For decades, the cornerstone of IT security has been Public Key Infrastructure, or PKI, a system that allows you to encrypt and sign data, issuing digital certificates that authenticate the identity of users.
Some 20 years ago, the founders of Amazon and Google essentially set the course for how the internet would come to dominate the way we live.
I would like to take a step back to take in a broader, bigger picture than usual in this article, moving across time as well as into the legal sphere. Technology isn’t just hardware and software; it’s a fundamental component of every aspect of our live…
A pair of malicious activities have become a stunning example of digital transformation – unfortunately on the darknet.
Drones, the popular name for unmanned aerial vehicles (UAVs), are a new toy for hobbyists, a tool for commerce, and a multi-purpose device for the military.
“There are just too many things we have to think about every day, too many new things we have to learn. New styles, new information, new technology, new terminology … But still, no matter how much time passes, no matter what takes place in the interim,…
The city of Portland, Ore. has set out to fully leverage the Internet of Things and emerge as a model “smart” city.
In cybersecurity, the bad guys almost always have a head start on the good guys. There are several reasons for this, but basically security is fundamentally reactive, and there is asymmetry in the battle.