Cybersecurity for the travelling scientist
Virtual private networks, tracking apps and ‘burner’ laptops: how to protect sensitive data when you take your research on the […]
Virtual private networks, tracking apps and ‘burner’ laptops: how to protect sensitive data when you take your research on the […]
The EU needs to step up its cooperation between civil and military cybersecurity authorities when member states are attacked by […]
UK Home secretary Amber Rudd faced a barrage of criticism after she warned social media and companies to break encryption. […]
On August 1, 2017, Senators unveiled a bipartisan bill to mandate baseline cybersecurity requirements for internet connected devices purchased by […]
On July 28, 2017, the FTC published the second blog post in its “Stick with Security” series. As we previously […]
Porn browsing habits and confidential documents are found in supposedly anonymised data. Source: It is easy to expose users’ secret […]
Governments forget at their peril that they must nowadays guard their citizens’ data as carefully as they guard their physical […]
How do you ensure that an Internet-connected sensor or device—often inexpensive and designed for lifespans of up to 20 years […]
“Cyborgification” raises a host of ethical questions, but employer-driven “chipping” poses at least three immediate challenges. Source: Embedded chip on […]
More than 50 percent of Google Play apps targeted at children under 13—we examined more than 5,000 of the most popular (many […]
Applying a customer identity and access management platform to your organisation could better prepare your business for GDPR. Source: Why […]
Many people crossing the U.S. border are concerned about the amount of power that the government has asserted to search […]