Press Source: Communiciations of the ACM (Opinion Piece)

Bursting a few balloons regarding the famous DARPA red balloon challenge

"It is timely to reflect back on the DARPA Network Challenge in 2009 … some important details have not previously been reported.”

Read Article
Press Source: ZDNet (Video)

The threat from hackers is getting worse – and ignorance isn't an excuse...

“We have found that the number and magnitude of breaches has been increasing. So the trend is clearly in the wrong direction.”

Read Article
Press Source: Harvard Business Review (Opinion Piece)

Navigating cybersecurity risks in international trade

" ... digital products sold across borders are subject to increased scrutiny and controls, and can be targeted for bans ... by host governments."

Read Article
Press Source: Inc.

How to protect yourself from ransomware attacks, according to cybersecur...

"The trouble is that a determined attacker will find a way in. ... You need cyber fire drills so ... you're prepared.”

Read Article
Press Source: CNBC (Video)

Gas station owners sue Colonial Pipeline after ransomware attack

"It's the hackers who are the bad guys...the question that is raised with this is what liabilities, what responsibilities does Colonial have?"

Read Article
Press Source: Newsweek

Launching a ransomware attack against a nation is far easier than you th...

"...there are many reasons why ransomware events go unreported, but an unwillingness to admit a breach is a major one."

Read Article
Press Source: Newsweek

As classes resume at UMass Lowell after cyberattack, MIT cyber expert we...

...in terms of cybersecurity infrastructure, the higher education sector sits far behind the manufacturing and energy industries...

Read Article
Press Source: Harvard Business Review (Opinion Piece)

Is third-party software leaving you vulnerable to cyberattacks?

"When companies buy digital products, they expect them to be secure...they don't test for vulnerabilities down the digital supply chain."

Read Article
Press Source: USA Today

Fact check: Hackers using visually similar characters to deceive in phis...

“Most people by now have gotten a little bit suspicious...how can they trick you into thinking you know who it is or what it is when it isn't."

Read Article
Press Source: The Athletic (Subscription Required)

Blockchain, crypto and NFTs are the risky 'next generation of value crea...

“The fundamental risk (with NFTs) is that the value is really in the eyes of the beholder."

Read Article
Load More