What not to do after a data breach

What not to do after a data breach

Thousands of words have been written about how to prevent cyberattacks and what to do if you've been targeted. Unfortunately, there's no standard…

Cryptocurrencies a growing issue for military, intel agencies and law enforcement [Commentary]

Cryptocurrencies a growing issue for military, intel agencies and law enforcement [Commentary]

While many have not heard of or understand cryptocurrencies, you had better take notice — that is for sure! This is a powerful technology whose…

Patchwork security through the PATCH Act [Commentary]

Patchwork security through the PATCH Act [Commentary]

The government has responded to the recent WannaCry ransomware outbreak, which used stolen NSA cyber tools – EternalBlue and DoublePulsar.

When is a leak ethical? [Commentary]

When is a leak ethical? [Commentary]

Undoubtedly, leaking classified information violates the law. For some individuals, such as lawyers, leaking unclassified but still confidential…

The growing North Korean cyber threat [Commentary]

The growing North Korean cyber threat [Commentary]

North Korea terrorized a U.S. company, attempted a major cyber bank heist, launched its ransomware across the world, and is now implicated in a…

Top