previous arrow
next arrow
Slider

Blog

By Howard Solomon

Is your vacuum cleaner spying on you?Maybe, if it’s connected to the Internet.Researchers at security firm Checkmarx have been looking into several Internet-connected devices, including the Trifo Ironpie M6, one of a number of circular vacuum cleaners being sold that automatically sweeps your floors and carpets. What makes the Trifo

By Allen Bernard

As good at artificial intelligence is at spotting hidden patterns and advanced cybersecurity threats, it isn’t ready to take humans out of the loop. With the number of cybersecurity threats increasing daily, the ability of today’s cybersecurity tools and human cybersecurity teams to keep pace is being overwhelmed by an

By Esther Shein

Without regulation and strong proactive measures, 5G networks remain vulnerable to cyberattacks, and the responsibility falls on businesses and governments. Seemingly everywhere you turn these days there is some announcement about 5G and the benefits it will bring, like greater speeds, increased efficiencies, and support for up to one million

By Lee Sustar

For anyone who’s made it through the twin expo floors at the annual RSA Conference – past the big-name vendors with magicians, fast-talking comedians, flashy free gadgets and weighty swag bags – you’ll find a collection of startup booths with basic brochures, big ideas and an intriguing demo. But will

By BRIAN FINCH

In 1983 computer science Ph.D. student Fred Cohen developed a novel software program that would surreptitiously install itself on host computers and quietly surrender all rights, privileges, and data to Cohen. Upon seeing the extraordinary success of the software after it was tested on university computers, Professor Len Adelman commented

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.