What Capital One Got Wrong (and Right) After the Breach

With over 106 million customers and applicants’ personal data exposed, the Capital One breach is one of the biggest breaches of a financial institution in US history. A former employee of Amazon’s cloud-computing unit was able to exploit a… Continue reading What Capital One Got Wrong (and Right) After the Breach

Is Privacy Possible? 5 Ways to Protect Your Data

Companies have been harvesting our data without our knowledge for years now. Whether its because they didn’t inform us, we didn’t read the terms and conditionsor because the language in the terms and conditions was so complicated and misle… Continue reading Is Privacy Possible? 5 Ways to Protect Your Data

5 Reasons to Embrace Secure Communications for Senior Living

Mobile devices have become ubiquitous in day-to-day life. The majority of Americans own a smart phone and use it not just for personal matters but for professional matters, too. It’s a technology that spans gender, location, profession and age &#… Continue reading 5 Reasons to Embrace Secure Communications for Senior Living

Incident Response in the Oil and Natural Gas Industry: It’s All About Communications

After Hurricane Sandy in 2012, the Department of Energy (DoE) asked the National Petroleum Council (NPC) to provide specific actionable steps to better prepare the oil and natural gas industry’s response to natural disasters. In response, the NPC… Continue reading Incident Response in the Oil and Natural Gas Industry: It’s All About Communications

The Nuclear Industry and Communication: Lessons from Three Mile Island

It’s been forty years since the infamous Three Mile Island accident, an incident made famous bythe confusion and panic it spawned in its wake. But while the incident is remembered for the fear it stoked about nuclear energy, it also set the stage… Continue reading The Nuclear Industry and Communication: Lessons from Three Mile Island

Password Protection in the Enterprise – Secure Way to Communicate and Protect

They’re a basic foundation of security, yet somehow constantly dismissed.
Passwords are one of the most important components of a strong cybersecurity strategy—but employees overwhelmingly have bad password habits – despite all attemp… Continue reading Password Protection in the Enterprise – Secure Way to Communicate and Protect

Making Sense of Security, Privacy and Confidentiality in Texting

Today, pretty much everyone is texting. It’s made life so much easier – send a message on your own time and preferred device, usually without having to stop what you’re doing, and rest assured that the recipient will receive the messa… Continue reading Making Sense of Security, Privacy and Confidentiality in Texting

The problem with vulnerable IoT companion apps

There’s no shortage of exploitable security holes in widely used Internet of Things devices, so it shouldn’t come as a surprise that the communication between many of those devices and their companion apps is not encrypted. The research A g… Continue reading The problem with vulnerable IoT companion apps

Australia: Parliament passes anti-encryption bill

The Parliament of Australia has passed the Assistance and Access Bill 2018, which allows Australian authorities to pressure communication providers and tech companies into giving them access to encrypted electronic communications, all in the name of fi… Continue reading Australia: Parliament passes anti-encryption bill

Government Messaging Solutions for the 21st Century: Think Beyond Encryption

The DNC email leak in 2016 revealed just how insecure email communications can be. It should be no surprise that government officials have been turning to other, more secure mediums, to communicate. White House staffers have reportedly usedthe encrypti… Continue reading Government Messaging Solutions for the 21st Century: Think Beyond Encryption