Data Breaches: Someone Else’s Problem
INT. SECURE VAULT — NIGHT An impenetrable vault. Walls 3 feet thick. Smoke reveals laser motion sensors and heat sensors. A biometric iris scanner restricts access. Television monitors show every…
DetailsINT. SECURE VAULT — NIGHT An impenetrable vault. Walls 3 feet thick. Smoke reveals laser motion sensors and heat sensors. A biometric iris scanner restricts access. Television monitors show every…
DetailsSometimes a technology comes out that is so radical, so new, so innovative that it transforms society, disrupts business processes, and creates new industries in ways we can hardly have…
DetailsSo a bunch of (very attractive) female celebrities’ iCloud accounts were reportedly hacked, and naked pictures of these (very attractive) celebrities were stolen from their accounts. The hackers then either…
DetailsDoctor, Doctor, Give Me the News! At a recent CISO conference in New York, the conference sponsor gave all of the attendees (yes, all of the attendees) a Fitbit device…
DetailsI recently read an article in Wired about problems with a particular airport security body scanner. Apparently, semi-clever attackers can conceal guns, knives and explosives in a way that makes…
DetailsHow would you feel if your email provider were routinely reading your e-mails, looking for illegal content, and then turning over the contents of your e-mail to law enforcement agencies…
Details