Posted on 31 March 2015 by
If one of your acquaintances has a chronic condition, such as asthma or epilepsy or diabetes—one day, in the not too distant future, they may wear a smart device (IoT) that monitors their vitals. In the event that the data emanating from the device—and possibly processed in the cloud—would be indicative of an imminent crisis, […]
Posted on 01 April 2015 by
Telling a friend that you’re going to an identity and access management (IAM) conference may do little to elicit their excitement. But explaining to them that some systems today already use their social feeds, news feeds and big data to assess whether their login to a favorite retail site is legitimate may do better to […]
Posted on 05 April 2017 by
Hollywood is portraying the cybersecurity industry as action packed and engaging with hackers from the dark side. What can we learn from cybercriminals? How is Hollywood educating society to be more secure online?