Verizon, AT&T, T-Mobile–I hope you are reading this. Mobile telephony, your primary business model of enabling phone calls and text
Vulnerabilities in cloud-sharing services stem from the usage of multiple cloud services because of which users need to keep adapting
The adoption of public cloud computing makes user data less secure. And it's not for the reasons most in IT
“Why do you teach me ABC?” My precocious preschooler pointed to the virtual QWERTY keyboard on the tablet: “Why not
Unless we do something proactively, social engineering's impact is expected to keep getting worse as people's reliance on technology increases
Two out of three Americans with jobs are already working from home because of the pandemic. Many will have to
Last week, New York City Mayor Bill de Blasio warned residents of a widespread Twitter and text-message circulated misinformation campaign
This month we learned that a US maritime base had to be taken offline for more than 30 hours because
Cyber hygiene: the term that is evoked whenever there is a threat to our infrastructure, a ransomware attack, or any data breach. It
Cyberwarfare suddenly went public late last month. Multiple media outlets reported that President Trump had authorized U.S. Cyber Command to