Dec 7, 2019 | Biometrics, Business, credential stealing, Employees, Facial Recognition, Radio Show, Radio_Show, Security, Technology
The Convenience of Facial Recogition is not All Its Cracked Up to Be As technologies advance many of them are sold to us as a convenience. Nowhere is this more evident as in the whole face recognition for security arena. Think about how much trouble companies...
Nov 30, 2019 | Agencies, Business, China, Cybercrime, DARPA, DOD, Drones, Government, Hackers, Hacking, Hacking, Internet, Iran, Machine Learning, Military, Monitoring, Nationstates, Patching, Privacy, Projects, Radio Show, Radio_Show, Russia, Security, Security Alerts, Software Manufacturers, Technology, third-world, Threats, Updates, Warfare
The Road To Machine Learning Wars How we fight wars is changing and changing in a big way. With the advancement of technology, conducting our battles will be done with speed and accuracy unavailable today, and we will be facing wars driven by machine learning...
Nov 30, 2019 | Business, Computers, Cyber breaches, cyberattacks, Cybercrime, Data Storage, Employees, Firewalls, Hackers, Hacking, Hacking, Hacking, Insider Threat, Intellectual Property Theft, Internet, Malware, Malware, Networking, Networking, Patching, Privacy, Radio Show, Radio_Show, Routers, Security, Security Alerts, segmentation, Technology, Updates, Vulnerabilities
Why Zero Trust Is the Answer to Internet Everywhere Connections Everyone everywhere has a mobile device, and connections to the internet are available whenever we want it. In our connected world, it means that keeping your businesses secure means fighting a...
Nov 23, 2019 | anonymity, automation, Big Data, Big Tech, Big Tech, Business, Business Email Compromise, Computers, Consumer, cyberattacks, Data, data sharing, Data Storage, Databases, Encryption, Hackers, Hacking, Hacking, Hacking, Internet, Liability, Machine Learning, Monitoring, Radio Show, Radio_Show, Resources, Security, Software, Technology
Big Data, Data Brokers and Your Information Big Data brokers collect our data and establish “hidden” ratings about us before selling it to those who will pay. This information is used by marketers, insurance companies, credit companies, and merchants. ...
Nov 23, 2019 | Applications, Big Tech, Business, CEO, Computers, cyberattacks, Government, Hacking, Hacking, Internet, Microsoft, Microsoft, Microsoft, Radio Show, Radio_Show, Ransomware, Ransomware Attack, Security, Technology, Windows (Microsoft)
Tackling Ransomware on Windows Microsoft has 1 billion Windows-OS powered PCs in use worldwide which explains why they are such a big target for hackers. There are a number of Windows security threats that everyone needs to be aware of including potentially...
Nov 23, 2019 | Advertising, Android, Big Tech, Black Friday, Business, Cell Phone, Cyber Monday, Cybercrime, Financial, Gifts, Hackers, Hacking, Hacking, Internet, iPhone, Liability, Online, Passwords, Patching, Phishing, Phone, Phones, Privacy, Radio Show, Radio_Show, Retail, Security, Security Alerts, Shopping, Smart Phone, Technology, Updates
Hand in Hand On Black Friday — Shopping and Privacy Black Friday is almost upon us! The day that retailers finally able to move from a red accounting register on to the black and it is always met with sales and loss leaders (great prices but not for the...