Cybersecurity

Colossal Privacy Risks of Everyday Digital Afterimages

What’s an afterimage, you ask? It is a visual phenomenon where a picture continues to appear in your sight, even after you’ve stopped looking at it. You know the one. If you’ve ever seen a spot of light after a bright camera flash, you’ve experienced an afterimage. Try the following experiment. Stare right at bright

[ Read More ]

When You Think About Security, You’re Doing It Wrong

One of the biggest challenges we face in the world of cybersecurity is not phishing attacks or ransomware or firewall disasters—but rather, our name. Coined for the industry about 30 years ago, the term cybersecurity connotes some fairly off-putting feelings. For people on the outside, it can feel forbidding, fear-based, or even downright scary—so many

[ Read More ]

Is There An Easy Way Startups Can Prevent Deadly Data Disasters?

When it comes to cybersecurity and data protection, small to mid-sized businesses (SMBs) and startups face the same big risks as large enterprises . Only, when founders are busy bootstrapping, fundraising, and prototyping, there’s not a lot of time to be stuck in a server closet dedicated to security. Nor is there time to have

[ Read More ]

How Can Digital Security Help In The Battle Against Gun Violence?

Digitally speaking, your information must have the freedom to move around the internet—connecting, sharing, transmitting, and making the technological world turn. And physically speaking, our bodies must also be able to move around the world in relative safety, working and thriving to keep our lives in motion. It is at this juncture between what we

[ Read More ]

Beware The Dinosaurs: Colossal Threats That Are Hardly Extinct

Classic hacks—they’re still with us. Every day, the internet is filled with new threats and amazingly creative exploits that stun the imagination. But damage is also continually being done by the “oldies-but-goodies” of yesterday. Despite the fact that many of these cyber attacks were first attempted when the internet was in its infancy, they remain

[ Read More ]

Why The U.S. Withheld Their Support For Improved Security In The World

If you see the president of France, Emmanuel Macron, scratching his head, chances are it has something to do with Trump’s latest visit to Paris. Aside from a few rain-related snafus, the biggest American-made thorn in the side of fellow diplomats—all gathered together to commemorate the 100th anniversary of the World War I armistice—was the lack

[ Read More ]

Microchip Security: New Biometric Will Make You See The Future

Who doesn’t love a biometric security measure? Whether it’s a thumbprint on your iPhone or facial recognition software, having your technology and personal devices quickly and conveniently authorize you in a split second is pretty darn cool. Not only does it make moving through your day just a little bit easier, it also has that

[ Read More ]

Cybersecurity Certifications: Do They Really Matter?

An important weapon in the war on cybercrime is the hundreds of thousands of cybersecurity professionals working day in and day out to protect organizations around the globe. These are the “good guys” and we need to give them as much of an edge as we can against all the cyber baddies out there. Comprehensive

[ Read More ]

Is Blockchain Technology A Solution For IoT Security Problems?

At first, making all of our machines and devices “smart” seemed like a great idea—and in many ways, it ways.  The digitization of our very lives through the internet of things (IoT)—including conveniences like Bluetooth speakers, iPhones, and voice-activated baby monitors—has changed the landscape of our day-to-day experiences and made them easier, more intuitive, and—well,

[ Read More ]

A Chilling IoT Reality: Will My Refrigerator Be Hacked?

With the advancement of the ‘connected cloud’ the Internet of Things (IoT) has also taken flight. Not long ago, IoT was a futuristic glimmer in the eye of blue chip brands like GE and Viking. Manufacturers of refrigerators, toasters, microwaves, and printers would have had to store data locally on the device itself instead of

[ Read More ]