GUEST ESSAY: How data science and cybersecurity will secure ‘digital transformation’

In today’s environment of rapid-fire technical innovation, data science and cybersecurity not only share much in common, it can be argued that they have an important symbiotic relationship. A fundamental understanding of the distinctions – … Continue reading GUEST ESSAY: How data science and cybersecurity will secure ‘digital transformation’

GUEST ESSAY: Rising workplace surveillance is here to stay; here’s how it can be done responsibly

People often recite the cynical phrase that ‘privacy is dead.’  I enthusiastically disagree and believe, instead, that anonymity is dead. One area where this is being increasingly demonstrated is in the workplace. Employee surveillance… Continue reading GUEST ESSAY: Rising workplace surveillance is here to stay; here’s how it can be done responsibly

PODCAST: Why companies need a strategy to manage compliance, now more than ever

Businesses are embracing the public cloud at an accelerated pace — and for good reason. By tapping hosted services,  companies of all sizes and in all verticals are finding fresh, dynamic ways to engage with employees, suppliers, partners an… Continue reading PODCAST: Why companies need a strategy to manage compliance, now more than ever

GUEST ESSAY: How Orbitz’s poor execution of a systems upgrade left data exposed

In case you thought it had been a suspiciously long time since a massive data breach was announced, well, here you go. Just a couple of days ago, Orbitz (part of the massive travel conglomerate Expedia) revealed that during the second part of last year… Continue reading GUEST ESSAY: How Orbitz’s poor execution of a systems upgrade left data exposed

GUEST ESSAY: Surveillance cam hack shows potential for ransomware collateral damage

The recent charges, and subsequent arrest, of two Romanians alleged to be responsible for a widespread hack of surveillance cameras in our nation’s capitol raises a number of intriguing questions. Why hack surveillance cameras? What nefarious act… Continue reading GUEST ESSAY: Surveillance cam hack shows potential for ransomware collateral damage

GUEST ESSAY: U.S. ‘chip’ adoption reduces card scams — but drives up new account fraud

Identity theft and fraud hit an all-time high in 2017, according to the 2018 Identity Fraud Study released last week by Javelin Strategy & Research. Among Javelin’s key findings fraudsters claimed 1.3 million more victims in 2017, with $16.8 … Continue reading GUEST ESSAY: U.S. ‘chip’ adoption reduces card scams — but drives up new account fraud

GUEST ESSAY: Fraudsters adjust to wide use of ‘chip’ cards – new account fraud rising

Identity theft and fraud hit an all-time high in 2017, according to the 2018 Identity Fraud Study released last week by Javelin Strategy & Research. Among Javelin’s key findings fraudsters claimed 1.3 million more victims in 2017, with $16.8 … Continue reading GUEST ESSAY: Fraudsters adjust to wide use of ‘chip’ cards – new account fraud rising

GUEST ESSAY: How children using illegal streaming devices get targeted by malicious actors

It is good to see pressure from advertisers  prompting a tech titan to clean up its digital neighborhood. I refer to steps being taken recently by Alphabet,  the parent conglomerate of Google and YouTube. Alphabet announced a new plan to keep… Continue reading GUEST ESSAY: How children using illegal streaming devices get targeted by malicious actors

GUEST ESSAY: Why cyber attacks represent a clear and present danger — and what you can do about it

As we begin a new year, cyber attacks may actually pose a more profound threat to mankind than the specter of nuclear warfare. So says billionaire investor Warrant Buffet, and I tend to agree with him. Cyber attacks are growing in prominence every day … Continue reading GUEST ESSAY: Why cyber attacks represent a clear and present danger — and what you can do about it

GUEST ESSAY: Google study details how 9 million account logons get stolen every 24 hours

Google should be applauded for spending a year studying how cybercriminals highjack account login credentials and expose them in the cyberspace. The search giant’s findings are astounding and instructive. Stolen passwords get channeled into the d… Continue reading GUEST ESSAY: Google study details how 9 million account logons get stolen every 24 hours