The Spy in Your Pocket: Smartphones & Data Privacy
In our modern world, we’ve normalized the collection and monetization of our personal data. While these practices may seem innocuous … Read more
In our modern world, we’ve normalized the collection and monetization of our personal data. While these practices may seem innocuous … Read more
In its prime BlackBerry’s mobile phones were coveted as a status symbol. The company had hit its peak at 80 … Read more
Endpoint security has evolved significantly since the early days of computing. In this article, I outline the history of how … Read more
Authentication-based security is a critical component of data security, yet for quite some time it seems that how it’s approached … Read more
A 2019 report from Burning Glass noted a 94% growth in the number of cybersecurity job postings since 2013. Unfortunately, … Read more
Remote working has been on the rise well before COVID-19 – from 2005-2019 the number of non-self-employed remote workers in … Read more
Companies that process and store sensitive data such as intellectual property (IP) and personally identifiable information (PII) are valuable targets … Read more