Sections

Viewpoints

Authoritarianism goes viral

In the midst of a global pandemic, all governments are tasked with caring for their citizens. How does this change for those under authoritarian regimes?

7 April 2020 min read

The disclosure of vulnerabilities and the vulnerability of disclosures

perex__ Vulnerability disclosure is an important process to keep our systems safe. What if the disclosure itself is also vulnerable?

Vulnerability disclosure is an important process to keep our systems safe. What if the disclosure itself is also vulnerable?

25 March 2020 min read

CEOs quit Tweeting to boost security

perex__ Senior leaders see cyber as No. 1 risk; now comes heavy lifting to impose cyber hygiene in a complex environment

Senior leaders see cyber as No. 1 risk; now comes heavy lifting to impose cyber hygiene in a complex environment

5 March 2020 min read

Balkanization and globalization: the battle for freedom in the internet

perex__ Nationalism is fueling the isolation of the internet

Nationalism is fueling the isolation of the internet

20 February 2020 min read

Iran’s revenge is already well under way

perex__ {value=Long stretch of reconnaissance, malware plantings position Iran to carry out varied attacks on the U.S. and its allies }

Long stretch of reconnaissance, malware plantings position Iran to carry out varied attacks on the U.S. and its allies

29 January 2020 min read

Keeping your part of the IoT safe

perex__ {value=The Internet of Things is vast, complex, and filled with risk – but network security can simplify it}

The Internet of Things is vast, complex, and filled with risk – but network security can simplify it

22 January 2020 min read

Visit Avast website

2020: Rise of the world's elite hackers

perex__ The geopolitical cyberwar between Iran, China, North Korea, Russia and the liberal democracies is about to get very sophisticated

The geopolitical cyberwar between Iran, China, North Korea, Russia and the liberal democracies is about to get very sophisticated

6 January 2020 min read

What you need to know about the CVV numbers on the back of your credit card

perex__ Attention holiday shoppers: The card verification value should never be stored online

Attention holiday shoppers: The card verification value should never be stored online

11 December 2019 min read

What everyone needs to know about the technical foundation of digital privacy

perex__ Efforts are progressing to preserve Public Key Infrastructure and digital certificates at the core of cybersecurity

Efforts are progressing to preserve Public Key Infrastructure and digital certificates at the core of cybersecurity

5 December 2019 min read

How Bitcoin has sparked what may be a techno-industrial revolution

perex__ Blockchain technology isn’t just about crypto cash; it could be the basis for giving individuals control of their digital personas

Blockchain technology isn’t just about crypto cash; it could be the basis for giving individuals control of their digital personas

30 October 2019 min read

Who owns your data? Probably not you

perex__ Supreme Court rulings show how technology and the law evolve

Supreme Court rulings show how technology and the law evolve

28 October 2019 min read

Twin terrors: The rising threat of credential stuffing and account takeovers

perex__ Darknet tandem takes full advantage of Big Data, high-velocity software, and automation

Darknet tandem takes full advantage of Big Data, high-velocity software, and automation

15 October 2019 min read