Monitoring for Retaliative Cyberattacks
The Department of Homeland Security (DHS) warned us of Iran’s ability to carry out cyberattacks with disruptive effects against critical U.S. infrastructure. This important news came […]
The Department of Homeland Security (DHS) warned us of Iran’s ability to carry out cyberattacks with disruptive effects against critical U.S. infrastructure. This important news came […]
You don’t tend to think of technology when I say farming. However, these days farmers can use all the good news they can get. […]
Fifty websites have been taken over from a North Korean hacking group by Microsoft. The websites were being used to carry out cyberattacks. This important […]
When we talk about cybersecurity and data breaches, one of the more terrifying applications of this is when it comes to our democracy. Hackers […]
Ransomware is a type of malicious software designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing […]
Recently, the Joint Research Center issued a Proposal for a European Cybersecurity Taxonomy. Noting the absence of a globally accepted and standardized definition of cybersecurity […]
Digital transformation affects all industries, even the defense industry. Along with progress comes security risks. There are those posed by emerging technologies and it […]
Data breaches and hacker activities are being published in the media almost every week. With every report, consumers become increasingly frustrated and organizations face […]
Disney + has been the latest bandwagon that everyone has jumped on, and I reluctantly admit even I, who like very little of their […]
There is growing concern that the trend toward emerging technologies like artificial intelligence (AI) is creating a divide. Computer scientists say AI research is becoming increasingly […]