Latest News
-
CyberSecurity
9 Questions Businesses Should Ask Themselves Before Implementing A Know Your Customer (KYC) Process
June 11, 2018Businesses of many types employ various processes and procedures in order to observe “Know Your Customer”...
-
CyberSecurity
Facebook Admits That Millions Of Private Posts May Have Accidentally Been Made Public
June 7, 2018Facebook said today that as many as 14-million Facebook users who thought that they were making...
-
CyberSecurity
What Damage Actually Occurs When Companies Do Not Properly Secure Their Intellectual Property And Other Sensitive Data?
June 4, 2018One of the questions that I am sometimes asked is how important cybersecurity really is in...
-
CyberSecurity
1/3 of Cyberattacks Target Industrial Systems, and 7 Other Important Factoids from Infrastructure Week in Washington, DC
May 31, 2018I recently attended Infrastructure Week in Washington, DC, as a guest of Siemens, and witnessed the...
-
CyberSecurity
FBI Urges All Home And Small Business Users To Reboot Their Routers
May 28, 2018The United States Federal Bureau of Investigation (FBI) is urging everyone who operates a home or...
-
CyberSecurity
13 Tips to Achieve Great CyberSecurity Without Spending a Fortune
May 24, 2018Hackers seeking to steal data and money used to target primarily large corporations and government...
-
CryptoCurrency / BlockChain / ICO
Blockchain Week – May 18 – New York, NY
May 18, 2018I will be attending two events on Friday, May 18th in New York City: TokenMatch –...
-
CryptoCurrency / BlockChain / ICO
SEC Creates Fake Cryptocurrency To Help Educate Consumers About Crypto-Investing Scams
May 17, 2018An amazing new cryptocurrency was announced yesterday that combines “the two most growth-oriented segments of the...
-
CyberSecurity
Infrastructure Week – May 17 – Washington, DC
May 16, 2018I will be attending the The Future of Cybersecurity presentation at Infrastructure Week in Washington, DC. On...
-
CyberSecurity
Why You Need To Mask Sensitive Information
May 14, 2018We are all familiar with the concept of data masking – when you enter a password...