ForgeRock 2020 Predictions
By Eve Maler, Interim CTO, ForgeRock Healthcare patients will be able to share and redact their data in 2020. 2020 will be the year healthcare IT moves from data privacy…
Secure Data Is Gold: U.S. Immigration Options for Cybersecurity Experts
By Lin Rose Walker, Esq. and Scott R. Malyk, Esq. A decade ago, very few people outside of the Information Technology (IT) industry knew what cybersecurity was or even considered…
The Intersection of Artificial Intelligence and Cybersecurity
By John Harrison, Director, Cybersecurity Center of Excellence, Criterion Systems It is easy to be skeptical about Artificial Intelligence (AI). It has been promised (threatened?) for years, and while it…
Three Key Business Lessons From The Founder of a Big Data Security Company
By MacLane Wilkison, Co-Founder of ZeroDB When startups mix with corporations we see an oil-and-water effect. There’s often a gap in work practices, organizational structure, and managerial outlook, not to…
Privacy and Security Issues in Autonomous Cars
By David Navetta, Boris Segalis, and Kris Kleiner, Norton Rose Fulbright US LLP As the development of self-driving car technology progresses, the prospect of privately-owned autonomous vehicles operating on public…
The Evolving Landscape of Cybersecurity for SME’s
A brief digest from the SecureWorld New York 2019 New York, NY – With all the high-profile cyberattacks receiving coverage in the media as of late, cybersecurity is quickly becoming…
NordVPN, TorGuard, and VikingVPN VPN providers disclose security breaches
NordVPN and TorGuard VPN firms were hacked, threat actors leaked the private keys used to secure their web servers and VPN configuration files Hackers have breached the systems used by NordVPN…
How to investigate a cyber crime scene?
By Milica D. Djekic The crime may appear anywhere – even in cyberspace. It’s simply a social phenomenon that would include people to deal in an inappropriate manner. So, as…
Data Availability: Laying the Digital Foundation for a More Intelligent Business
Building strong digital foundations that focus on data availability will be vital to the future of every organization. They must implement effective intelligent data management strategies that help them be…
High Schools Are Not Exempt From Attack
San Diego USD By Charles Parker, II; Cybersecurity Lab Engineer High schools are much like universities and colleges, in that these hold a mass amount of data which may easily…
The Myths You Shouldn’t Believe
By Sebastian Schaub, CEO, Hide.me There is a lot of information on the web regarding VPNs along with a wide and varied selection of VPN services to choose from. With…
Still Misconfiguring Servers…
Addressing the Addressable By Charles Parker, II; Cybersecurity Lab Engineer When academics and students are writing papers, research is required. The research not only focused on the germane topic, however,…