Mobile Cybersecurity Tips for the Holidays

Katie Niemi and Eric Vanderburg While being diligent with your online shopping is important and necessary, there are a few […]

Full Details

The lonely castle: Insights into the evolution of cybersecurity defense

This technological era is one that changes rapidly and so do defense strategies.  In the ancient world, combat strategies might […]

Full Details

Reducing Wildfires with IoT, ML, and Drones

The wildfire that ripped through California in early October caused tremendous damage and the loss of over 30 lives.  So […]

Full Details
Linux Ransomware

Ransomware threatens Linux servers, especially web servers

Linux is an open-source operating system that is very versatile due to the large group of volunteers that maintain and […]

Full Details

The Journey to Cybersecurity Success: Interview with Xerox CISO, Alissa Johnson

Cybersecurity challenges companies, countries, and individuals to continually improve protections against an enemy that wants our secrets, money, and identify.  […]

Full Details
Privacy is not dead

Privacy is not dead

An acquaintance from a younger generation said to me one day, “Don’t you know that privacy is dead?” I was […]

Full Details

Karmen ransomware makes it easy to launch attacks

A new ransomware do-it-yourself kit called Karmen is making it easy for wannabe cybercriminals to launch ransomware attacks. Security researchers […]

Full Details