Default Security Settings, What Needs to Change?
Today, news agencies and outlets are reporting Information Technology (IT) breaches and loss of protected data at alarming rates. The...
Hacking Cars, Plans, and Devices
How safe are we? If planes can be hacked and cars can be hacked, what is preventing terrorists or contract killers from hacking vehicles...
New Attack Techniques 2017
The Seven Most Dangerous New Attack Techniques, and What's Coming Next "Moderator: Alan Paller, Research Director and Founder, SANS...
Cyber Security News (5 OCT 17)
Cybersecurity and The Law China has is implementing a new Law that requires companies to store all data within China and submit to and...
Microsoft Ignite 2017 Keynote
Satya Nadella, CEO Microsoft, oversees all aspects of Microsoft business and leadership--from cloud and mobile development to digital and...
Dangers of IoT
The Oct. 21st 2016 DDoS attack on the domain name servers of DYN has been the recent topic of many articles lately. The attack left many...
Hacking the Coffee Pot
The more and more items we add to the IoT (Internet of Things) the more and more security hacks you should expect to find. You have...
Next Big Driver of IoT
Interesting Info-graphic about the next big driver for IoT devices. #IoT #InternetofThings #Career #Business #Financial
TU DDoS and IoT
On 21 OCT 2016 one of the largest scale Distributed Denial of Service (DDoS) attacks was launched against US based websites. One of the...
Real-Time Operating Systems (RTOS)
Many people don’t realize that computers in cars, appliances, hospital equipment, and everywhere else need operating systems. Operating...