Steganography-Still Active
The act of hiding a message may be tracked historically at least to the time of Caesar with their rudimentary cryptography when sending...
Cybersecurity self-assessment tool for small businesses
National Institute of Standards and Technology (NIST) projects are size neutral. While their tools are often used by large organizations,...
Autonomous Vehicles: Here They Come
Over the last few years vehicles certainly have been upgraded. The latest of vehicles on the road, connectedness has been the focus....
Emails...trouble waiting in cyberspace
The bruising Presidential election of 2016 does provide one positive note if nothing else. It demonstrates to every person paying...
Vendors Still Need to be Monitored
With time, the vulnerabilities from aps continue to grow. As these became known, patches are created and pushed. This has tended to be a...
Breached EHR: A Gift that Keeps on Giving
Health facilities are enumerated and attacked with regularity due to the target, medical records, having a distinct value. Another...