The Place of Secure Browser Extensions in 2019’s Enhanced Cyber Threats

One of the popular ReadWrite posts discussed the 6 emerging cyber threats to look out for in 2019. These threats call for more robust security tools and strategies to protect our data. Also, the rapid rate of advancement in cyber threats deems it necessary that we constantly adapt to developments in the cyber world. Browser

The Place of Secure Browser Extensions in 2019’s Enhanced Cyber Threats
What Frequent Fliers Need to Know About Airport Facial Recognition

You spend so much time in airports that the security agents and coffee shop clerks know your face. How would you feel if the computers and cameras knew you just as well? Facial recognition in American airports isn’t a sci-fi future scenario. According to a report from the Department of Homeland Security, 97% of U.S

Cybersecurity in the VA: A Pressing Problem That Demands Improvement

The Department of Veterans Affairs (VA) houses massive amounts of data on thousands of veterans all over the country. Furthermore, the Veterans Health Administration (VHA) is considered the largest integrated healthcare system in the United States. So when it comes to the topic of cybersecurity in the VA, there’s a lot at stake. Is enough

3 Surprising Benefits of the Cloud in IoT

It’s no surprise that companies implementing dynamic IoT solutions are doing so by harnessing the power of cloud computing. However, it may surprise you how cloud computing is benefitting these IoT initiatives. When referring to the cloud, many talk about its scalability, cost-effectiveness, and low maintenance, yet the cloud has so much more to offer

As Digital Identities Evolve, Data Security Should Too

Estonian Prime Minister Jüri Ratas arrived at the World Economic Forum’s annual meeting in Davos, Switzerland, in late January with praise for his country’s digital identity program. Estonia has one of the world’s foremost digital identity programs, which allows its citizens to use their identities to vote, buy medication, sign documents, and more. Our digital identity isn’t


Security | University Websites: Top 10 Design Guidelines