Jan 25, 2020 | Advertising, Amazon, Apple, Big Tech, Business, Copyright, Financial, Google, Internet, Legal, M&A, Marketing, Marketing Manipulation, Microsoft, Microsoft, R&D, Radio Show, Radio_Show, Technology
Big Tech Stomps All Over Small Businesses Are small tech companies being squeezed by tech giants? You bet and it has happened numerous times. Sometimes they announce a big product or service, never planning to ever bring it to market. They drive excitement for their...
Jan 11, 2020 | Access Controls, Amazon, Apple, Asset Management, Attack Vectors, audit logs, Backup, Big Tech, Business, Computers, Cyber breaches, Cybercrime, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Employee Training, Employment, Encryption, Fines and Penalties, Google, Hacking, Incident Response, industrial espionage, Insider Threat, Internet, Jobs, Legal, Liability, Malware, Malware, Microsoft, Monitoring, Networking, predictive algorithms, Radio Show, Radio_Show, Ransomware, Security, Software As A Service, Surveillance, Technology, Zero-Day
How Mature is Your Insider Threat Intelligence? Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...
Jan 11, 2020 | Algorithms, Applications, applications, Applications, Artificial Intelligence, Automation, Automotive, Business, Cars, Coding, Computers, Consumer, CPU, Cyber Liability, Encryption, Hacking, Incident Response, Law Enforcement, Liability, LIDAR, Location Data, Machine Learning, Navigation, Patching, Police, predictive algorithms, Radio Show, Radio_Show, safety, Security, Security Alerts, Technology, Updates
Soon Most New Cars May feature Light Detecting, and Ranging (LIDAR) Sensors In an announcement on Thursday, the Tier 1 auto-parts maker Bosch is planning to use remote pulsed laser light sensors to measure distances, officially known as LIDAR. They are one of the few...
Nov 9, 2019 | Applications, Applications, Audit Logs, Best Practices, Business, cyberattacks, Hacking, Hacking, Internet, Judicial, Legal, Liability, Patches, Patching, Radio Show, Radio_Show, Ransomware, Ransomware, Resources, Security, Security, Security Alerts, Software As A Service, Software Manufacturers, Technology, Third-Party, Updates
Lawfirm Software attacked by Ransomware Legal offices use case management software to assist them in preparing for trials. One of the largest providers is a company called TrialWorks. Unfortunately, a cybercriminal was able to launch a REvil/Sodinokibi...
Nov 9, 2019 | anonymity, Applications, Audit Logs, audit logs, automation, Big Tech, Business, Cloud Vendors, Code-Breaking, Computers, Consumer, credentials, Cyber breaches, Data, Data Storage, Databases, Elections, Elections, Encryption, Government, Hackers, Hacking, Hard Disks, Internet, Legal, Machine Learning, Malware, Nationstates, Networking, Online Voting, Organized Crime, Patching, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, Technology, Updates, Voting Technology
Online Voting is a Disaster waiting to Happen If it is connected it can be hacked. The risk of only digital data that can not be audited is just a sure way to assure meddling and hacking of our elections. The integrity of our elections must remain paramount if...
Oct 26, 2019 | Automation, Automotive, Business, Legal, Liability, Radio Show, Radio_Show, Repair, safety, Technology, Tesla
They Look Cool but How Safe Are They? I have been warning about these embedded handles for a while. As you may know, I spent 10+ years as a volunteer advanced EMT where I responded to a number of accidents. Handles that completely fold inside the door are dangerous...