Keeping Legacy Software Safe

Keeping Legacy Software Safe

Keeping Legacy Software Safe The primary problem with legacy software is keeping it secure.  Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered.  That means that they were not designed...
Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption

Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption

Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption Facial Recognition is not a perfect technology and still needs some time before being widely used in societal applications until we get our hands around the issues of privacy, safety and...
Home Security and Alarm Systems Useless After Charter Cable  Pulls Plug

Home Security and Alarm Systems Useless After Charter Cable Pulls Plug

Home Security and Alarm Systems Useless After Charter Cable  Pulls Plug What happens when a cable company shuts down a product they previously sold to customers?  What happens when they refuse to refund customers for proprietary products they purchased to support the...
No Security for Windows 7 After Today

No Security for Windows 7 After Today

No Security for Windows 7 After Today Are you using Windows 7?  Did you know some of the largest firms in the country (even large financial institutions) are still using it?  Today is the day that Microsoft ends support for Windows 7 and will no longer offer security...

Technology Can Only Protect You So Much — Then Other Tactics are Needed

Technology Can Only Protect You So Much — Then Other Tactics are Needed Businesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the...