alexanderNew technology pushes machine smarts to the edgeWith the advent of the Industrial Internet of Things and Industry 4.0, the use of smart edge devices is becoming more common in factory…Apr 8, 2017Apr 8, 2017
alexanderGmail Phishing Attack Reinforces that 2FA is the Cyber-Safety Belt We All NeedIt is time to shift from a single password to multi-factor authenticationMar 18, 2017Mar 18, 2017
alexanderIt’s Not Always the Hackers…20 years ago, I was working the graveyard shift as a policeman on the south side of Chicago. Part of the area I patrolled included one of…Mar 18, 2017Mar 18, 2017
alexanderGrandmothers, Gangsters, Guerrillas and GovernmentsI recently flew to Knoxville Tennessee to visit Oak Ridge National Laboratory (ORNL) and deliver a talk at the 11th Annual Cyber &…Mar 18, 2017Mar 18, 2017
alexanderThis Week in Security: Expert Takes on the HeadlinesMy Other Robot Is Your RobotMar 18, 2017Mar 18, 2017
alexanderPrivacyKPMG is dedicated to protecting the confidentiality and privacy of information entrusted to it. As part of this fundamental obligation…Mar 18, 2017Mar 18, 2017
alexanderThreats to Patient Data Security From the Board’s PerspectiveWith a plethora of studies and articles maintaining that the healthcare industry is behind when it comes to security, many healthcare…Mar 18, 2017Mar 18, 2017
alexanderCyber attacks IoT-devices: who is to blame and what to do?Given the enormous speed of development, the problem of security IoT-devices is quite acute, so a number of large IT-companies have already…Mar 7, 2017Mar 7, 2017
alexanderMaloney and Velázquez call for investigation into alleged Russian election hacksBy Mary Frost Brooklyn Daily EagleMar 7, 2017Mar 7, 2017
alexanderUnprotected IoT devices could become a powerful weapon for cyber warsInternet of Things (IoT) is certainly the future, but so has the ambiguities in this field that few know how to set regulations, standards…Mar 7, 2017Mar 7, 2017