The security mistakes made by the Iowa Democratic Party in creating their App

The security mistakes made by the Iowa Democratic Party in creating their App

The security mistakes made by the Iowa Democratic Party in creating their App Last week there was a caucus in Iowa. Caucuses by their very nature are prone to manipulation and miscounting. Then you add in the fact that the party chose to use a new technology that was...
DHS wants to track illegal aliens using available cell-phone location data. ACLU says Whoa!

DHS wants to track illegal aliens using available cell-phone location data. ACLU says Whoa!

DHS wants to track illegal aliens using available cell-phone location data. ACLU says Whoa! We have a problem with illegal immigrants.  Now don’t get me wrong we love immigrants and they can add a lot to our economy but those immigrants come to our country through...
Privacy Gone: Tech Start-up Has Huge Facial Recognition Database

Privacy Gone: Tech Start-up Has Huge Facial Recognition Database

Privacy Gone: Tech Start-up Has Huge Facial Recognition Database   What if I told you that there was a biometric artificial intelligence program that might end privacy as we know it… would you believe me?  What if I told you that the company that developed it was...

Updates, Patches and Hackers Oh My!

Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...
How Mature is Your Insider Threat Intelligence?

How Mature is Your Insider Threat Intelligence?

How Mature is Your Insider Threat Intelligence? Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...

Hackers Preying on Old and Decrepit Technology

Hackers Preying on Old and Decrepit Technology 1042-02 Cybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older...
Malcare WordPress Security