The world is changing and so does the way we handle our cybersecurity issues. Securing our systems has become so advanced such that people without knowledge about the security of various systems are finding it hard to survive in a technological world that is changing on a daily basis. Hackers are becoming more advanced in their undertakings such that they are jeopardizing our … [Read more...] about Lattice Cryptography Countering the Effects of Quantum Computer
cyber
Passenger Technology Solutions 2019
Passenger Technology Solutions, taking place at the Hamburg Messe, Germany, 2 - 4 April 2019, is the global event for the latest technologies and innovations shaping the future of the end-to-end passenger journey. Heading into its second year, and co-located with the World Travel Catering & Onboard Services Expo (WTCE), Aircraft Interiors Expo (AIX) and the Passenger … [Read more...] about Passenger Technology Solutions 2019
How Cyberwar Became the New Normal (and How to Fight It)
In April of 2018, 34 of the world's leading tech and cybersecurity companies banded together on their own volition to sign the Cybersecurity Tech Accord. These companies include Cisco, Microsoft, HP, Facebook, and Nokia. Then, in June, 11 more companies signed on, including Carbon Black, Salesforce, Atlassian, and Gigamon. The reason for the accord is the alarming expansion of … [Read more...] about How Cyberwar Became the New Normal (and How to Fight It)
One Single Technology Could Have Prevented All the Biggest Data Breaches in the Past Year
If you've followed the news in the last year, you have probably heard about at least one major data breach exposing the information of millions of Americans. In 2017, there were a record-breaking 1,579 reported data breaches, a 44.7% increase over the numbers reported in 2016 (which was also a record-breaking year). This explosive growth in the number of reported breaches each … [Read more...] about One Single Technology Could Have Prevented All the Biggest Data Breaches in the Past Year
What to Do During a Ransomware Attack: How to Assess the Damage and Recover Your Files
It's a typical weekday morning. You begin reading emails on your laptop while the coffee brews. One email contains an unexpected business opportunity. The email closes with a request for you to "download the document to view the full proposal." Before you can stop yourself, you click the link ”and immediately a picture like the one above takes over your screen. Nothing can … [Read more...] about What to Do During a Ransomware Attack: How to Assess the Damage and Recover Your Files