Get in Touch
It’s great that more folks are backing up their files using cloud-based services like Dropbox. While hackers and virus writers get all the headlines,...
For the first time, according to a recent study, criminal and state-sponsored hacks have surpassed human error as the leading cause of health care...
One of the most popular sessions at the RSA Conference was the Cryptographers’ Panel, during which some of the founding fathers of modern cryptography discussed...
True or False? There was no way the Office of Personnel Management could have prevented hackers from stealing the sensitive personal information of 4.1...
Some secrets are more valuable than others. And some secrets are more valuable TO others. In perhaps the most predictable extortion hack ever, cheating...
The other cufflink fell on the Ashley Madison hack Tuesday.
According to Wired, 9.7 gigabytes of Ashley Madison data were dumped on the dark web,...
Account takeover fraud — which occurs when a cybercriminal gains unauthorized access to an online account — is growing rapidly, a new analysis by...
In my forthcoming book, Swiped, partially excerpted below, I examine some of the enterprise level, cybersecurity best practices. These are the questions organizations need...
In 2015, somewhere in the neighborhood of 1 billion Internet of Things (IoT) devices will be purchased, an increase of 60% over the previous...
If you have an account on Facebook, you may have noticed posts featuring a nicely designed cloud comprised of the words that your Facebook...