Jan 18, 2020 | Access Controls, Applications, Attack Vectors, automation, Business, CEO, Coding, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Storage, Hackers, Hacking, Hacking, Internet, Patching, Radio Show, Radio_Show, safety, Security, Security Alerts, spying, Technology, Third - Party, Updates
A Lesson to Learn – If it is Connected It can Be Hacked I remember years ago at CES 2013, when this young entrepreneur scheduled an interview with me to show off a prototype for his new Ring security device. At the time, IoT was in its infancy, and this product...
Jan 11, 2020 | Algorithms, Applications, applications, Applications, Artificial Intelligence, Automation, Automotive, Business, Cars, Coding, Computers, Consumer, CPU, Cyber Liability, Encryption, Hacking, Incident Response, Law Enforcement, Liability, LIDAR, Location Data, Machine Learning, Navigation, Patching, Police, predictive algorithms, Radio Show, Radio_Show, safety, Security, Security Alerts, Technology, Updates
Soon Most New Cars May feature Light Detecting, and Ranging (LIDAR) Sensors In an announcement on Thursday, the Tier 1 auto-parts maker Bosch is planning to use remote pulsed laser light sensors to measure distances, officially known as LIDAR. They are one of the few...
Nov 9, 2019 | Android, Android, Applications, Applications, applications, Biography, Business, Cars, Coding, Consumer, Hacking, Hacking, Hacks, Internet, iOS, iPhone, Mapping, Mobile, Mobile Phones, Navigation, Patches, Patching, Phone, Phones, Radio Show, Radio_Show, safety, Security, Security Alerts, Smart Phone, Software Manufacturers, Technology, Third-Party, Tracking, Travel, Updates, vehicles
Powerful Apps allow Control for…. Ever! Many companies are creating apps and they are powerful. They are convenient and offer ease of use to their product lines. However, they may not have concidered the implications when not used in the manner that they...
Sep 27, 2019 | Audit Logs, Business, Coding, cyberattacks, Cybercrime, Cybersecurity, data sharing, Databases, Governance, Hacking, Nationstates, Organized Crime, Radio Show, Radio_Show, Security, Security Alerts, Technology
Audit Logs May Help You Make Your Case — If You Have Them Most businesses today are fielding malicious attacks on a daily and sometimes hourly basis. Do you keep audit logs of the activity on your computer system? Logs can act as a red flag to identify when...
Sep 14, 2019 | automation, Automation, Automotive, Business, Cars, Coding, DOJ, Fines and Penalties, Navigation, Radio Show, Radio_Show, Robotics, Security, Technology, Tesla, Transportation, vehicles
Tesla Autopilot Feature Raises Issues Yet another Tesla driver has apparently fallen asleep behind the wheel while his car cruised down the freeway. The latest video comes from the Boston area, where a local man caught a video of a Tesla driver and his...
Jun 1, 2019 | Business, Coding, Open Source, Radio Show, Radio_Show, Technology
Open Source Is Changing The Way We Approach Everything Software engineers for decades have relied on open source components to enhance their programs, speed development, and deliver them more rapidly. The use of open source software meant that these engineers...