Security and the right to repair collide at DefCon
A DEF CON® Hacking Conference demonstration highlighted the collision between the popular right-to-repair movement with the equally popular demand for secure electronic devices.…
Read more...A DEF CON® Hacking Conference demonstration highlighted the collision between the popular right-to-repair movement with the equally popular demand for secure electronic devices.…
Read more...The concept of Zero Trust is often explained with the analogy of a castle.…
Read more...When we speak about Cybersecurity, we are mostly discussing software. What about hardware?…
Read more...Keeping the best talent will always be an uphill battle. From trying to entice teachers to forgo higher pay to motivating well-paid employees to achieve more and elevate the corporate vision, nearly endless factors shape the equation of: will they stay or will they go?…
Read more...It’s a bad year for the reputation of cryptocurrency. The foundation of cryptocurrencies, blockchain, has not faired much better.…
Read more...Cyberspace is a complex system with the potential for infinite expansion.…
Read more...A few weeks ago, marketing departments for cryptography companies went into overdrive.…
Read more...Last month, it was reported that Roblox – an online game creation platform – had suffered a data breach after one of its employees fell victim to a phishing attack.…
Read more...With technology such an integral part of our day-to-day lives, it’s easy to forget how much work goes on behind the scenes to keep things running smoothly.…
Read more...The announcements in the past few weeks from Apple, Google and other major consumer companies about transitioning out of the age of passwords were heavy on hype and short on reality.…
Read more...