From the U.S. to Europe and Asia: Cybersecurity Policies Around the Globe

Whether it’s a data breach, theft or a cyber attack, nations are facing constant threats to their networks. As a result, governments worldwide are implementing cybersecurity policies to combat rising cyber crime. Cybersecurity threats are a growing concern around the world, as businesses and government agencies are hit with data breaches and cyber attacks on a large scale. Whether [...]

2017-05-26T19:12:54+00:00 Categories: Government|Tags: , , , |Comments Off on From the U.S. to Europe and Asia: Cybersecurity Policies Around the Globe

Cyber Security and Its Role in Government. How Government Can Combat Cyber Threats

Cyber Security is Vitally Important for Government Organizations Discover how government data can be exposed and learn what’s being done to combat cyber threats. Government organizations are under constant threat from cyber crime. Unfortunately, they have so far been ill-prepared in their cyber security to meet and prevent these attacks. According to a recent report, government agencies [...]

2017-10-31T18:09:12+00:00 Categories: Government, News|Tags: , , , |Comments Off on Cyber Security and Its Role in Government. How Government Can Combat Cyber Threats

Censorship Around the World: When Does Global Cybersecurity Cross the Line?

Cybersecurity is necessary to protect governments around the globe from cyber threats, but what happens if cybersecurity oversteps its bounds and threatens freedom and privacy? Governments and other organizations around the world are bolstering their cybersecurity efforts, not only to protect their information assets and systems, but also to fight cyber terrorism. However, cybersecurity can often be hindered or restricted [...]

2017-06-06T18:15:17+00:00 Categories: Government, News|Tags: , , |Comments Off on Censorship Around the World: When Does Global Cybersecurity Cross the Line?

Hillary vs. Donald: Cyber Security and the President-Elect

    Cyber security has been at the forefront of the U.S. presidential campaign. Not only has Hillary Clinton been in the hot seat for using an unsecured private email server during her time as Secretary of State, her campaign has been the victim of a series of email hacks from WikiLeaks. There have also been concerns [...]

Information Security Challenges and Presidential Politics

In recent years information security challenges have dominated headlines as hacking incidents at companies – such as Home Depot, Target and Anthem – become more prevalent. But 2016 seems to be the year of the political hack. A lack of information security can prove to be debilitating to even the most savvy political campaigns, as career politicians [...]

The Feds Aren’t the Only Ones in the Warrantless Wiretapping Game

The modern world is exploding with new technologies that have the potential to radically alter human life on this planet both for the better and the worse. The burgeoning of surveillance technology has already begun to become pervasive in the public and private sectors, ranging from the rampant police department misuse of telephone eavesdropping devices [...]

Borrowed your Friend’s Netflix Password? Don’t Worry, You’re Probably Not a Criminal, Just a Cheapskate.

Contributed by Jeffrey Sebranek The July 5, 2016 court case heard by the United States Court of Appeals 9th Circuit, has created a firestorm of controversy over the now potential illegality of friendly and familial password sharing for popular internet services such as HBO GO, Netflix, and Amazon Prime. The case bringing this issue to [...]

DNC Gets Hacked

Contributed by Jeffrey Sebranek The 2016 DNC Hacking Two nebulous Russian hacking organizations have recently infiltrated the network of the Democratic National Committee, making off with emails, chats and a cache of opposition research on presumptive Republican Presidential nominee Donald Trump according to the DNC and cybersecurity firm Crowdstrike. The DNC learned of the hack [...]

2017-06-07T16:29:24+00:00 Categories: Government, News|Tags: , , , , |0 Comments

Business Email Compromise (BEC)

In this age of rapidly expanding technology, where the hacker persists one step ahead of the cybersecurity curve, business email compromise (BEC) remains a low-tech but highly lucrative card in the cyber criminal deck. According to an alert issued by the FBI, over the past two years internet swindlers have managed to pilfer $2.3 billion [...]

2016-10-24T13:31:29+00:00 Categories: Financial, Government|Tags: , , , |0 Comments

The Backbone of Bitcoin, the Blockchain, Seeks Fresh Applications

The blockchain is the technology created by Satoshi Nakamoto that underpins the cryptocurrency Bitcoin. While Bitcoin is beginning to take world by storm, blockchain applications other than cryptocurrency may just be the tip of the iceberg. Recently, numerous people and organizations, including Microsoft and a consortium of international banks, are beginning to explore and adopt [...]