A Note on Privacy
This note provides a basic overview of privacy issues, with an emphasis on the implications of the web and social networks.
This note provides a basic overview of privacy issues, with an emphasis on the implications of the web and social networks.
This note provides a brief description of web application vulnerabilities and preventive measures.
This note provides a summary of disaster recovery with emphasis on information technology disaster recovery.
A technical note framing the different levels at which cybersecurity problems are encountered.
Reprivata developed a cybersecurity solution which could fundamentally change how companies create private, trust-based interconnections with their third-party business partners. Now, how do they attract the right “early adopter” to implement it?
A martial arts expert applies cyber forensics to identifying sexual predators who run or work at martial arts schools. He worries about the implications of publishing his findings.
A large regional hospital in Florida wrestles with the issues associated with adopting telemedicine standards in an age of electronic health records and increasing compliance concerns.
Tribridge, an award-winning provider of cloud services specifically designed for Microsoft ERP solutions, needs to decide how to move its Health360 platform forward. Of particular concern was deciding how to position it with respect to Microsoft, who supplied the underlying platform on which the application was built.
A client of a security services firm has received an email from the dark web demanding a ransom or it will start selling data it has stolen from the client. The client as asked for the firm’s assistance in paying the ransom. How should the company proceed?
A physicist who studies the human brain has adapted dynamic logic, a machine learning algorithm he developed, to run on a test database of network traffic. The algorithm has proven surprisingly adept at identifying malware traffic. Now he ponders how the project might move forward, given that cybersecurity is entirely outside of his domain of …