Sections

Viewpoints

What you need to know about the CVV numbers on the back of your credit card

Attention holiday shoppers: The card verification value should never be stored online

11 December 2019 min read

What everyone needs to know about the technical foundation of digital privacy

perex__ Efforts are progressing to preserve Public Key Infrastructure and digital certificates at the core of cybersecurity

Efforts are progressing to preserve Public Key Infrastructure and digital certificates at the core of cybersecurity

5 December 2019 min read

How Bitcoin has sparked what may be a techno-industrial revolution

perex__ Blockchain technology isn’t just about crypto cash; it could be the basis for giving individuals control of their digital personas

Blockchain technology isn’t just about crypto cash; it could be the basis for giving individuals control of their digital personas

30 October 2019 min read

Who owns your data? Probably not you

perex__ Supreme Court rulings show how technology and the law evolve

Supreme Court rulings show how technology and the law evolve

28 October 2019 min read

Twin terrors: The rising threat of credential stuffing and account takeovers

perex__ {value=Darknet tandem takes full advantage of Big Data, high-velocity software, and automation}

Darknet tandem takes full advantage of Big Data, high-velocity software, and automation

15 October 2019 min read

Sky-high concerns: Understanding the security threat posed by drones

perex__ {value=They are susceptible to all the cyber threats that face the Internet of Things, and can be hijacked for unintended purposes}

They are susceptible to all the cyber threats that face the Internet of Things, and can be hijacked for unintended purposes

26 September 2019 min read

Visit Avast website

AI never forgets, so we must teach it to forgive

perex__ Artificial intelligence is listening, and that is unstoppable – but we must all safeguard the privacy of children

Artificial intelligence is listening, and that is unstoppable – but we must all safeguard the privacy of children

22 September 2019 min read

A primer on the promise and pitfalls of the Internet of Things

perex__ Granular behavior profiling paves the way for new digital lifestyles – and creates big privacy and security questions

Granular behavior profiling paves the way for new digital lifestyles – and creates big privacy and security questions

12 September 2019 min read

Hackers set the pace in security

perex__ Criminals get a head start, but we can chase them down with laws, industry tools, and consumer protection

Criminals get a head start, but we can chase them down with laws, industry tools, and consumer protection

11 September 2019 min read

La Liga: Turning users into involuntary spies

perex__ There is little that security software can do when the users themselves give apps broad permissions

There is little that security software can do when the users themselves give apps broad permissions

22 August 2019 min read

Does the U.S. need its own privacy law?

perex__ A look at how the GDPR model would fit with state laws and the needs of American businesses and consumers

A look at how the GDPR model would fit with state laws and the needs of American businesses and consumers

12 August 2019 min read

How ransomware rose to become an enduring scourge

perex__ Poorly defended cities are getting devastated by cyber blackmail shutdowns; companies relying on MSPs likely are the next big targets

Poorly defended cities are getting devastated by cyber blackmail shutdowns; companies relying on MSPs likely are the next big targets

6 August 2019 min read