Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption

Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption

Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption Facial Recognition is not a perfect technology and still needs some time before being widely used in societal applications until we get our hands around the issues of privacy, safety and...
What Does Your Employer Know About Your Daily Activities

What Does Your Employer Know About Your Daily Activities

What Does Your Employer Know About Your Daily Activities How much does your employer know about your personal life? Maybe more than you realize. When you use your personal devices to access company servers they can log your activities. Then they can track when you log...
No Security for Windows 7 After Today

No Security for Windows 7 After Today

No Security for Windows 7 After Today Are you using Windows 7?  Did you know some of the largest firms in the country (even large financial institutions) are still using it?  Today is the day that Microsoft ends support for Windows 7 and will no longer offer security...

A Lesson to Learn – If it is Connected It can Be Hacked

A Lesson to Learn – If it is Connected It can Be Hacked I remember years ago at CES 2013, when this young entrepreneur scheduled an interview with me to show off a prototype for his new Ring security device. At the time, IoT was in its infancy, and this product...

Routers and Firewalls with Broadcom Chipsets Are Vulnerable

Routers and Firewalls with Broadcom Chipsets Are Vulnerable Have you heard of the router/firewall critical vulnerability called Cable Haunt? Well, for 200 million worldwide users, this could soon be a nightmare come true. Cable Haunt allows a hacker to compromise the...

Updates, Patches and Hackers Oh My!

Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...