Part 1 of this series posited that the Internet of Things (IoT) needs a more rigorous security application than it currently has, lest we...
Hi, what are you looking for?
Part 1 of this series posited that the Internet of Things (IoT) needs a more rigorous security application than it currently has, lest we...
In 1969, Apollo 11 landed men on the moon, marking the first time in human history that people walked on a surface other than...
Sometimes a headline succinctly and cleverly captures the essence of a simple situation. Note last week’s headline about the apprehension of a nearly naked...
This time every year I tell myself the same thing: “You’ve got to cut back on the drinking.” But I’m not about to listen...
Municipal planners in Europe are embracing digital technologies to deliver various services to the citizens. Smart-city services connect Internet-enabled sensors on buses, in rental...
Are Too Many Companies Putting Identity and Access at Unnecessary Risk in Their Move to the Cloud?I was chatting with the CSO of a...
DynDNS (or just Dyn now) got blasted with #DDoS twice last Friday. Since Dyn is the major DNS provider for Twitter, Github, and Spotify,...
Password proliferation is bad, for many, many, many reasons. But the worst reason is that people tend to re-use passwords all over the place.
Where does SWEET32 rank against other SSL vulnerabilities?