Cybercrime: Critical Infrastructure Is Top Target
Cybercrime: Critical Infrastructure Is Top Target Read More »
Vendors have to up their game when it comes to selling cloud solutions. As soon as you start selling Managed firewall you are entering the #security realm. Knowing the existing security landscape vendor’s should be promoting security at the get go, ie. Security by Design, #Privacy by Design, etc….. I had a pleasure of dealing with a
Security Products need regulation? Read More »
When internet was born, services were siloed, flicker provided photography services, Hotmail provided email, and yahoo provided email and news. As the internet matured, the providers started providing more services. Microsoft, which was offering news, acquired hotmail and included it in their MSN suite. Later Yahoo acquired Flickr to add to their suite of products.Â
Is your data really yours? Read More »
Introduction Blockchain has been the most searched term in 2017 and to date it still is. In spite of the fact that blockchain technology has been around since 2009, with the first implementation being Bitcoin, there have not been any corporate-wide deployments yet. There are three blockchain deployment models: Public Private Hybrid All the major
Blockchain Security Read More »
The University of Central Florida (UCF) has admitted that hackers who broke into its systems may have snaffled the personal details of more than 60,000 staff and students. Link: Disney World-area University admits massive data breach
Disney World-area University admits massive data breach Read More »