An internationally published writer who specializes in cybersecurity, government issues, science, finance, technology, and education. With over 20 years of experience creating content for global leaders and SMEs, she brings a wealth of knowledge to areas of marketing, strategy, and business expansion, offering persuasive and compelling information for readers looking to learn and challenge the status-quo.

WordPress Is King—But Vulnerable—And Not Immune To Attack

If there is a God of the digital world, WordPress might as well be it. It is considered by the masses as the “go-to” tool for website or blog creation—and as an internet platform, it powers a staggering one third to one half of all websites in existence, stealing a substantial portion of market share

[ Read More ]

STIX And TAXII: Know How To Speak The Innovative Language

Drop the terms “STIX” and “TAXII” into general conversation at the dinner table, and it’s likely the kids will think you’re talking about a nature project, while the adults will be ordering you an Uber home to sleep it off. But in a different environment—say, across a boardroom table of IT executives or cybersecurity specialists,

[ Read More ]

Really, How Safe Is The Camera On Your Device?

These days, we take our mobile cameras pretty much for granted, regardless of whether we’re using our phone, tablet, laptop, or PC—either at home or work—to capture the the special (or even quite ordinary) moments of our lives. We are putting out tons of images each day and often consuming them as well through social

[ Read More ]

Real-Time Cyber War: It Fuels Terror But Does It Fulfill A Need?

The ability to watch global cyber attacks as they are about to happen? Sounds too good to be true, right? Nowhere else in the world can you locate a battlefield that is active 24/7 —and yet, if you turn on your PC, it’s possible to watch real-time cyberwar night or day. Right before your eyes,

[ Read More ]

This Is Why The Cyber Kill Chain Is The Best Way To Beat A Hacker

The main question behind all cyberattacks, regardless of their scope and size, is always the same: how did the hacker target and attack the organization? Lockheed Martin, an American aerospace company focusing on defense, security, and technology, has tried to address this ongoing query through the creation of a “Cyber Kill Chain”—an approach that essentially

[ Read More ]

Death and Learning: This Is How Virtual Reality Is Helping Life

In this techno-fuelled, 21st-century world, Virtual Reality (VR) is quickly becoming actual reality. And with our limited degree of human awareness, VR is penetrating multiple aspects of our lives, from online education to social interaction to live events to attending funerals. At the click of a button, live-streamed happenings can now be accessed all day,

[ Read More ]

How To Vaporize Online Abuse From Internet Trolls

Who are internet trolls and what do they want? Why are they always starting online fights, upsetting chat rooms, and throwing inflammatory torches wherever and whenever possible? They’re not the scary characters living under a bridge you may remember from childhood—they’re actually worse because they’re real. According to the slang definition, an internet troll is

[ Read More ]

A Cyber Attack On 911 Services Is The Most Terrifying Thing Ever

In 1968, the U.S. introduced the emergency number 911 which replaced the traditional dialing numbers for the police, fire, and ambulance. Today, North Carolina alone receives 8 million annual calls to 911, that’s more than 23,000 a day delivered across 188 call centers, and they all rely on the technology of 20 routers to service

[ Read More ]

The Surprising Ways A Cyberattack Can Literally Kill You

When we hear the word cyberattack, we likely imagine an aggressive targeting of information technology, including the networks and infrastructures where it hides. Our understanding is not wrong, as the definition is similarly emphasized in security-based articles or media reports we encounter.  However, we would be wrong to assume that the effects of a cyberattack

[ Read More ]