Security

Ticketfly

What to Know About the Ticketfly Hack

On Thursday of last week, Ticketfly, the popular online box office, received a bit of a makeover. Their website, rather than directing users to concerts and events of their choosing,

Israel

How Israel Became a Cybersecurity Powerhouse

“Israel is blessed with many opponents, and as such, it developed core competencies mostly in the defense sector in order to be able to protect itself ” – Dudu Mimran, CTO of the Cyber Security Research Center at Ben-Gurion University.

Internet

Tech Giants Take on the Ivory Trade

In June last year, Google, Microsoft, Facebook, and Twitter released a joint statement announcing the formation of the Global Internet Forum to Counter Terrorism (GIFCT). The Forum was created to

MSOC

Keeping our Ports Safe with the MSOC

You might assume that most products arrive in the U.S. after traveling hundreds of miles in the hold of an airplane or stacked in the back of a tractor-trailer. In

VPN

Modern Technology and a VPN: Do You Need One?

Modern technologies have changed drastically the last couple of years. Today, smartphones, tablets, smartwatches, laptops, and PCs are light years beyond what we had 10-15 years ago. Today, they are

The Two Faces of Anonymous

Who is Anonymous? I tend to become annoyed when I see articles about this – every tech reporter out there seems to think they’re contributing to “the revolution” by doing

Biometrics, Cyberattacks, and You

Gurpreet Manes on Internet Security and Biometrics. When Gurpreet Manes discusses today’s pandemic of security breaches, he realizes that hackers from U.S. adversaries and even domestically are already studying the

Ticketfly

What to Know About the Ticketfly Hack

On Thursday of last week, Ticketfly, the popular online box office, received a bit of a makeover. Their website, rather than directing users to concerts and events of their choosing,

Israel

How Israel Became a Cybersecurity Powerhouse

“Israel is blessed with many opponents, and as such, it developed core competencies mostly in the defense sector in order to be able to protect itself ” – Dudu Mimran, CTO of the Cyber Security Research Center at Ben-Gurion University.

Internet

Tech Giants Take on the Ivory Trade

In June last year, Google, Microsoft, Facebook, and Twitter released a joint statement announcing the formation of the Global Internet Forum to Counter Terrorism (GIFCT). The Forum was created to

MSOC

Keeping our Ports Safe with the MSOC

You might assume that most products arrive in the U.S. after traveling hundreds of miles in the hold of an airplane or stacked in the back of a tractor-trailer. In

VPN

Modern Technology and a VPN: Do You Need One?

Modern technologies have changed drastically the last couple of years. Today, smartphones, tablets, smartwatches, laptops, and PCs are light years beyond what we had 10-15 years ago. Today, they are

The Two Faces of Anonymous

Who is Anonymous? I tend to become annoyed when I see articles about this – every tech reporter out there seems to think they’re contributing to “the revolution” by doing

Biometrics, Cyberattacks, and You

Gurpreet Manes on Internet Security and Biometrics. When Gurpreet Manes discusses today’s pandemic of security breaches, he realizes that hackers from U.S. adversaries and even domestically are already studying the

SEARCH OUR SITE​

Search

GET THE LATEST ISSUE IN YOUR INBOX​

SIGN UP FOR OUR NEWSLETTER NOW!​

* indicates required

 

We hate spam too. You'll get great content and exclusive offers. Nothing more.

TOP POSTS THIS WEEK

INNOVATION & TECH TODAY - SOCIAL MEDIA​

Looking for the latest tech news? We have you covered.

Don’t be the office chump. Sign up here for our twice weekly newsletter and outsmart your coworkers.