An earlier version of this post appeared on CNN By now, we have all heard about last week's Colonial Pipeline
The Colonial Pipeline hack is now making the news and many cyber security experts are providing their take on how
Verizon, AT&T, T-Mobile–I hope you are reading this. Mobile telephony, your primary business model of enabling phone calls and text
Vulnerabilities in cloud-sharing services stem from the usage of multiple cloud services because of which users need to keep adapting
The adoption of public cloud computing makes user data less secure. And it's not for the reasons most in IT
“Why do you teach me ABC?” My precocious preschooler pointed to the virtual QWERTY keyboard on the tablet: “Why not
Unless we do something proactively, social engineering's impact is expected to keep getting worse as people's reliance on technology increases
Two out of three Americans with jobs are already working from home because of the pandemic. Many will have to
Last week, New York City Mayor Bill de Blasio warned residents of a widespread Twitter and text-message circulated misinformation campaign
This month we learned that a US maritime base had to be taken offline for more than 30 hours because