We’re in dangerous waters. For decades, IT leadership has been focused on battening down the hatches, patching holes, and bailing out the water as fast as we can when it comes to protecting ...Read more
The first documented use of passwords can be traced back to at least 200 B.C. when Roman soldiers first used them to tell friend from foe around their encampments. It was a system that was e ...Read more
Imagine if your home had over a million windows and doors? What are the chances that one or more of those entry points would be inadvertently left unlocked? What if there were thousands of invisible i ...Read more
On a geologically timescale, dinosaurs were wiped out in the blink of an eye. The use of usernames and passwords are headed for a similar fate, but at a pace that will probably make your head ...Read more
If you or your loved ones have been hospitalized anytime in the past several years, chances are they’ve been exposed to one or more potentially life threatening cyber security vulnerabilitie ...Read more
The enormous capabilities of smartphones, tablets, wearables, etc. are definitely "super" but are they secure? I think you can guess the answer to that question.