Cybersecurity

6 Privacy Solutions for Big Data and Machine Learning

Travelers who wander the banana pancake trail through Southeast Asia will all get roughly the same experience. They’ll eat crummy food on one of fifty boats floating around Ha Long Bay, then head up to the highlands of Sa Pa for a faux cultural experience with hill tribes that grow dreadful cannabis. After that, it’s […]

9 Technology Trends You Should Know For 2021

We often tell our MBAs not to try and predict the future. That’s because when you’re right, nobody will notice, but when you’re wrong, critics will crawl out of the woodwork to point out what a moron you are. The best thing to do is take someone else’s predictions and carefully critique them. Then, you’ll […]

Why Enterprise Backup Solutions are a Good Investment

The idea of backing up your data is as old as computing itself. Remember autosave? That was what you hoped would happen while typing away in Corel WordPerfect just in case you encountered the blue screen of death (BSOD). Back in the late 90s at the peak of dot-com mania, hard drive space was still […]

Group-IB: Threat Intelligence for Cybersecurity

One of the oldest cities in Russia is Samara, a town of just over one million people making it the ninth biggest city in Russia. It also happens to be a center for Russian aerospace and aviation which means there’s lots of talent around, any number of which can’t find work and end up turning […]

The World’s Most Elite Cybercrime Fighting Unit

“This is our world now… the world of the electron and the switch, the beauty of the baud.” Those words are from The Hacker Manifesto, an essay that was published in Phrack magazine and read by anyone who grew up in the world of Hacking, Phreaking, Virii, Anarchy, and Cracking – also known under the acronym HPVAC. […]

Zero Sign-on – Replacing Passwords with Smart Phones

Making sure someone is who they say they are – also referred to as authentication – is something that’s frequently conducted by soliciting the user with a string of characters that only that user is supposed to know. In an age where we’re creating synthetic life, this primitive method of authentication has changed very little. The requirements […]

10 Medical Device Cybersecurity Startups

As medical devices become more pervasive, there’s an increasing concern about cybersecurity. Cyber-attacks have been targeting practically every connected device available in the market today, with an average of one hack attempt every 39 seconds. Medical devices being hacked also damages brand reputation very quickly. (The notion of someone stealing your password is a whole lot […]

What is Ethical Hacking? A Look at 3 Types of Startups

Remember when actor Matthew Broderick was cool and didn’t have a dad bod? That was the 1980s, when he did movies like Ferris Bueller’s Day Off and WarGames. In the latter, he plays a computer hacker who breaks into a government supercomputer and nearly starts a nuclear war amid some lighthearted hijinks. More than three […]

AI for Web and Mobile App Security Testing

People who work in Software Quality Assurance (SQA) are responsible for ensuring that a piece of software is built to specification (internal requirements) and that what was built matches what the user needs (external requirements). It’s a very unrewarding job because even if you manage to achieve zero defects, you’re just seen as doing your job. […]

Blackberry – An Enterprise of Things Stock

If you’ve ever been in a business strategy class, you’ve probably been asked the big question. What’s the number one thing that a business needs to do? You might hear answers that talk about profitability, shareholders, and revenues. Those are all answers that make sense, but they’re not the right answer. The number one thing […]