The 2 Biggest Cybersecurity Fears of NASDAQ’s Chief Information Security OfficerMarch 27, 2017
I recently spoke with Lou Modano, Chief Information Security Officer of NASDAQ, and asked him what...
6 Insights From Experts at the NASDAQ-NCSA Cybersecurity SummitMarch 27, 2017
I recently attended the National Cybersecurity Alliance and NASDAQ’s joint Cybersecurity Summit, at which I asked...
Private Photos of Emma Watson and Amanda Seyfried Leak: 7 Important Lessons for All of UsMarch 16, 2017
Over the past day, nude, risqué, and other private photos of several celebrities leaked online, the...
Hundreds of Twitter Accounts Hacked to Show Swastikas. Here is What You Need to Know.March 15, 2017
Hundreds of Twitter accounts including those of major brands and institutions were compromised today – here...
US Air Force Leaks Sensitive Information On 4,000 OfficersMarch 15, 2017
A United States Air Force officer appears to have accidentally exposed extremely sensitive information including the...
Meet Anomaly Detection: A Powerful Cybersecurity Defense Mechanism When Its Weaknesses Are AddressedMarch 9, 2017
Anomaly Detection provides great security beneifts — but can also create serious problems. Please view the...
In My Humble Opinion…
Sexism In Tech: The Frank Conversation That Men Need To Have (As Told By A Man)March 8, 2017
“Hey G. I will not leave Berlin until having sex with you. Deal?” That’s an actual...
Catastrophic Leak: Wikileaks Publishes CIA’s Secret Hacking Tools (Inc.)March 7, 2017
WikiLeaks today published thousands of documents that it claims are from the CIA’s arsenal of hacking...
POSTS BY DATE
POSTS BY CATEGORY
- Artificial Intelligence (AI) (14)
- Book Review (9)
- Cool Tech (51)
- CryptoCurrency / BlockChain / ICO (30)
- CyberSecurity (346)
- Entrepreneurship (27)
- Events (9)
- In My Humble Opinion… (16)
- InfoGraphic (2)
- New York (14)
- News (131)
- Politics (34)
- Privacy (20)
- Product Review (2)
- Scams and Crime (62)
- Social Media (37)
- Toys / Children (10)
- Video (4)
JOIN MY NEWSLETTER