We’re in dangerous waters. For decades, IT leadership has been focused on battening down the hatches, patching holes, and bailing out the water as fast as we can when it comes to protecting ...

Read more

The first documented use of passwords can be traced back to at least 200 B.C. when Roman soldiers first used them to tell friend from foe around their encampments.  It was a system that was e ...

Read more

Imagine if your home had over a million windows and doors? What are the chances that one or more of those entry points would be inadvertently left unlocked? What if there were thousands of invisible i ...

Read more

On a geologically timescale, dinosaurs were wiped out in the blink of an eye. The use of usernames and passwords are headed for a similar fate, but at a pace that will probably make your head ...

Read more

If you or your loved ones have been hospitalized anytime in the past several years, chances are they’ve been exposed to one or more potentially life threatening cyber security vulnerabilitie ...

Read more

The enormous capabilities of smartphones, tablets, wearables, etc. are definitely "super" but are they secure? I think you can guess the answer to that question.

Read more

It’s not every day that a new mobile computing platform enters the market – especially one focused on the critical issue of cyber security and electronic privacy. So, here’s your chance ...

Read more