Few sectors face higher regulation and compliance standards in the United States than the aviation industry.
- By Kevin Tomich
- Apr 01, 2022
What you are about to read is like an old-fashion action-thriller book or movie. There is a very mean-spirited evil villain, and, happily, a protagonist to save the day.
- By Richard Kanadjian
- Mar 01, 2022
Let’s admit it. When analytics first hit the market, they got off to a rocky start. Lots of hype, and high expectations. When it came to delivering on those promises, their performance often fell short of the mark.
- By Robert Muehlbauer
- Dec 01, 2021
The term “smart city” has created a buzz in the past few years. More than that, the smart city concept is changing the way the world’s metropolitan areas operate. New York, Chicago, San Francisco and Seattle have integrated a variety of intelligent sensors to improve city operations.
- By Jason Bonoan
- Aug 02, 2021
Last year, global citizens experienced dramatic shifts to working from home in response to COVID-19 safety recommendations, with communication, technology and security companies supporting changing business and consumer needs with new products, services and data security tools.
It is amazing that the year of convergence from analog to IP was supposed to be 2008 but it was not until 2012 that IP-cameras started to outsell analog cameras. We sure have come a long way from those analog-oriented days.
- By Jay Jason Bartlett
- Feb 01, 2021
Over the past week, CBP officers in Cincinnati seized 200 counterfeit jerseys determined to have several athletes’ autographs that were unapproved and inauthentic. Had the clothing been real, their cumulative value would have been $42,625.
It’s no surprise that cyber security defenses took their first cues from the physical world. Castles have moats. Your house has a door with a lock. It makes sense to protect your network with a firewall. But cyber criminals soon crashed that plane.
- By Karthik Krishnan
- Dec 03, 2020
More than 100 Republican national security experts on Monday called on GOP congressional leaders to push President Donald Trump to concede the election to President-elect Joe Biden, according to the Washington Post. In a signed letter, the experts urged current GOP officeholders and Trump to prioritize the country's national security interests above politics.
Here is a Q&A that answers questions about spoofing the voter. The answers come from Chris Krebbs, CISA director.
The 2020 election season is a Big Deal as well it should be. The Vote, as foundational parts of the whole, is complicated in practice with history showing us just how complicated it can be. Protecting the process and making sure the Vote is fair, secure, and timely, is vital to American Democracy.
- By Saryu Nayyar
- Oct 28, 2020
Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Additionally, the ability to protect data and code is limited in conventional computing infrastructure.
Not all internet users are careless about their online security. But many are still victims of cybercriminals and stalkers due to mistakes online.
- By Waqas Baig
- May 18, 2020
With growing number of breaches, there is a huge need for more advanced measures to protect public sector data.
- By Warren Poschman
- May 12, 2020
Endpoints are common targets for ransomware and cryptojacking attackers. Here are the solutions available to address those risks.
- By Ilai Bavati
- May 11, 2020
The Star Wars series provides good examples that we can use as lessons to combat scammers attempting to profit from COVID-19, writes Tyler Reguly.
- By Tyler Reguly
- May 04, 2020
After customers reported fraudulent purchases, Nintendo announced that a credential stuffing campaign led to breaches of thousands of accounts.
- By Haley Samsel
- Apr 27, 2020
Nearly 450 active email addresses and passwords used by WHO staff have been leaked online, and the public has received email scams from people posing as staff.
- By Ralph C. Jensen
- Apr 24, 2020
In order to address vulnerabilities and risks, security teams must enable privileged access management and automate security tools, among other tips.
- By Eddie Segal
- Apr 23, 2020
Nearly 8,000 applicants to a Small Business Administration loan program may have had their data shown to other users filling out the application.
- By Haley Samsel
- Apr 22, 2020