Sections

Viewpoints

Does the U.S. need its own privacy law?

A look at how the GDPR model would fit with state laws and the needs of American businesses and consumers

12 August 2019 min read

How ransomware rose to become an enduring scourge

perex__ Poorly defended cities are getting devastated by cyber blackmail shutdowns; companies relying on MSPs likely are the next big targets

Poorly defended cities are getting devastated by cyber blackmail shutdowns; companies relying on MSPs likely are the next big targets

6 August 2019 min read

AI is on our side

perex__ Despite some widespread fears, artificial intelligence can help cybersecurity by blocking fake news and other threats

Despite some widespread fears, artificial intelligence can help cybersecurity by blocking fake news and other threats

30 July 2019 min read

A primer on cyber espionage across the planet

perex__ State-backed cyber spying is pervasive – and its impact on geo-political affairs is deepening

State-backed cyber spying is pervasive – and its impact on geo-political affairs is deepening

25 July 2019 min read

Can AI be evil?

perex__ {value=A conversation with Noel Sharkey of the Foundation for Responsible Robotics}

A conversation with Noel Sharkey of the Foundation for Responsible Robotics

13 July 2019 min read

Can legislation make smart devices secure?

perex__ {value=The temptation is to say yes, but the reality may be different}

The temptation is to say yes, but the reality may be different

10 July 2019 min read

Visit Avast website

The Eight Essentials of Secure Computing

perex__ Beginning with a secure browser and ending with a healthy paranoia, here are the essentials of staying safe online

Beginning with a secure browser and ending with a healthy paranoia, here are the essentials of staying safe online

24 June 2019 min read

Do you know the last time you were socially engineered?

perex__ The intensity of phishing campaigns endures, as threat actors manipulate human foibles to gain unauthorized access to homes and companies

The intensity of phishing campaigns endures, as threat actors manipulate human foibles to gain unauthorized access to homes and companies

19 June 2019 min read

What does gaming cost you?

perex__

The gaming industry uses psychological tactics to trigger addiction and more spending, but gamers can stay safe and sane with these tips.

30 May 2019 min read

Mobile threats are everywhere – here’s what you can do

perex__ Even if your company issues you a locked-down smartphone, embracing best security practices remains vital

Even if your company issues you a locked-down smartphone, embracing best security practices remains vital

14 May 2019 min read

The Supply Chain; aka the Hacker Food Chain

perex__ Could you be the weak link for hackers?

Could you be the weak link for hackers?

13 May 2019 min read

Geopolitical cybersecurity comes home

perex__ There will be more and more investigations into technology originating in undemocratic states

There will be more and more investigations into technology originating in undemocratic states

9 May 2019 min read