The Road To Machine Learning Wars

The Road To Machine Learning Wars

The Road To Machine Learning Wars   How we fight wars is changing and changing in a big way. With the advancement of technology, conducting our battles will be done with speed and accuracy unavailable today, and we will be facing wars driven by machine learning...
Upping your Incident Response Game — New Regulations coming

Upping your Incident Response Game — New Regulations coming

Upping your Incident Response Game — New Regulations coming   If you are a business and you have data on any Massachusetts resident or do business in Massachusetts, coming in early January, there are new data collection requirements with which you will need...
Why Zero Trust Is the Answer to Internet Everywhere Connections

Why Zero Trust Is the Answer to Internet Everywhere Connections

Why Zero Trust Is the Answer to Internet Everywhere Connections   Everyone everywhere has a mobile device, and connections to the internet are available whenever we want it. In our connected world, it means that keeping your businesses secure means fighting a...
Cybercriminals return to old-school ID theft tactics

Cybercriminals return to old-school ID theft tactics

Cybercriminals return to old-school ID theft tactics   As security professionals come up with new protocols and software to protect companies and businesses implement them, hackers are finding themselves thwarted. So many of these cybercriminals are going...
Reduce Vulnerabilities by Ditching Android

Reduce Vulnerabilities by Ditching Android

Reduce Vulnerabilities by Ditching Android   Like I repeatedly explain to people to ask me about Android. Android is not Android is not Android. Every Android phone is unique because the Manufacturers are allowed to freely create applications and interfaces and...