Technology Empowers Pandemic Response, But Privacy Worries Remain

Technology Empowers Pandemic Response, But Privacy Worries Remain

Technology Empowers Pandemic Response, But Privacy Worries Remain   In late January and early February, a study of influenza had the ability to reveal whether subjects in the Seattle area were infected by the novel coronavirus. But medical privacy rules scuttled...
5G Will Be Built-In to Almost Every Device Later This Year — Is Your Security Stance Ready?

5G Will Be Built-In to Almost Every Device Later This Year — Is Your Security Stance Ready?

5G Will Be Built-In to Almost Every Device Later This Year — Is Your Security Stance Ready? With 5G on the horizon, we are starting to see a significant expansion of the “Internet of Things” — and it is creating a huge security challenge for businesses! A...

Vulnerable Location data — It does not take an Expert to Spy on your Every Movement with Your Phone.

Vulnerable Location data — It does not take an Expert to Spy on your Every Movement with Your Phone.   The media tracked President Donald Trump’s movements during the campaign using cellphone data. Using leaked phone data to track the movements, one...
Powerful Apps allow Control for…. Ever!

Powerful Apps allow Control for…. Ever!

Powerful Apps allow Control for…. Ever!   Many companies are creating apps and they are powerful.  They are convenient and offer ease of use to their product lines.  However, they may not have concidered the implications when not used in the manner that they...