cybersecurity

457 Articles 5 Followers


The Millenium Bug: Surviving the Apocalypse that Never Was

18 Sep 2023 7 minute read 1 comment Investigator515

The run to the year 2000 wasn’t all smooth sailing. In the news of late, there’s been word of a new bug that may effect us in 2038. Those of the younger generation may not realize that we’ve been on this horse before. In today’s...

Is your phone secured ?

3 Sep 2023 3 minute read 0 comments Imad Eddine Aris

#Cybersecurity_topic Introduction The more precautions we take, and develop measures that can protect our privacy, credentials and sensitive data, the more Other people are making efforts to bypass that protection and make our life hell. But sometime...

Cybersecurity is Approaching a Crisis

21 Aug 2023 1 minute read 0 comments Matthew Rosenquist

Cybersecurity has a growing problem that will force an evolution in the industry — it must deliver more recognizable value! Cybersecurity must re-envision itself to both protect and become an active contributor to the overarching business goals. Emb...

Biometrics is a Security HOLE on the Worldcoin Crypto Project

9 Aug 2023 3 minute read 12 comments Debesh Choudhury

OpenAI co-founder and CEO Sam Altman put himself inside a biometrics crypto trap. Tech millionaire (or billionaire) Sam Altman's start-up Worldcoin emerged from stealth mode and offered free cryptocurrency to global citizens who verify their account...

New SEC Rules Mandate Cybersecurity Transparency and Oversight

28 Jul 2023 3 minute read 7 comments Matthew Rosenquist

The new SEC Rules establish a framework that requires rapid disclosure of material cybersecurity incidents (4 days), companies will need to be able to explain their cybersecurity posture to manage risks, and for boards to describe their oversight an...

Can AI Reshape Cybersecurity?

23 Jul 2023 2 minute read 2 comments Debesh Choudhury

Today, cybersecurity is a mainstream requirement. Nowadays, online activities increased tremendously. There are more virtual meetings than face-to-face meetings now. The world is slowly moving toward digital implementations in almost everything...

Biometrics is Not a Fallacy But Compromises Security

22 Jul 2023 4 minute read 5 comments Debesh Choudhury

Biometrics has been a subject of my applied research for more than ten years. I started carrying out three-dimensional (3D) object recognition in the winter of 2000. Then I was on a postdoctoral research stint at the University of Electro-Communicat...

National Cybersecurity Plan Fails to Address Ransomware

18 Jul 2023 1 minute read 0 comments Matthew Rosenquist

The US National Cybersecurity Strategy Implementation Plan fails to address ransomware. There is a real opportunity for the government to make significant progress in crushing the growing scourge of ransomware attacks which threaten businesses, indi...

Delayed Reporting of HCA Healthcare Data Breach

11 Jul 2023 1 minute read 1 comment Matthew Rosenquist

The recent HCA Healthcare data breach of 11 million patients’ data is shaping up to be another ugly incident where a company did not promptly communicate with its customers. HCA Healthcare is a large American healthcare services organization that co...

Applying a Cybersecurity Threat Agent Risk Assessment to Healthcare

7 Jul 2023 1 minute read 1 comment Matthew Rosenquist

There are many approaches to conduct a strategic cybersecurity risks assessment.  This is one of my favorite ways, using a Threat Agent Risk Assessment (TARA) methodology.  This paper was authored by Tim Casey, David Houlding, and I while we were at...