Mar 14, 2018

9 Pieces of Advice from (Badass) Women in STEM

By | March 14th, 2018|Ask The Experts, Kids and Security, Security & Pop Culture, Tips and Tricks|

Being a young girl with an interest in a technical field can be daunting. Statistics show that there is still a considerable gender gap everywhere you turn in this industry; it can get discouraging! Luckily, there are plenty of women who have gone before us who can provide some killer [...]

Mar 06, 2018

A Brief History of Data Breaches

By | March 6th, 2018|Security & Pop Culture|

The news is full of stories of confidential data that has been accessed by unauthorized individuals. These are called data breaches, and the damage done by these attacks can amplify over time as more data is leaked, sold, or used for unintended purposes. This is not a new threat, but [...]

Mar 05, 2018

What Do Meltdown and Spectre Mean For Web Development?

By | March 5th, 2018|Ask The Experts, Guest Post, Security & Pop Culture|

You’ve probably already heard about Meltdown and Spectre - two of the worst vulnerabilities ever discovered. But what do they mean for developers?   If you’re just turning in, independent security researchers made a disturbing discovery earlier this month. Cybersecurity is broken–and it has been for decades. A group of [...]

Feb 28, 2018

Bitcoin Security is Weak

By | February 28th, 2018|Ask The Experts, Guest Post, Security & Pop Culture|

This article covers the advantages and weak links of the Bitcoin infrastructure from a security perspective and compares this cryptocurrency to regular fiat currencies. Speaking of different forms of digital currencies, Bitcoin stands out from the crowd due to its decentralized nature and strong encryption practices propping its architecture. Importantly, [...]

Feb 07, 2018

Smart Home Technologies

By | February 7th, 2018|Guest Post, Security & Pop Culture|

The Internet of Things, or IoT, has made our homes much smarter and our lives much more convenient and easy. It connects all of our home devices and appliances through the internet and allows us to manage them remotely. But, have you ever stopped to think about whether this convenience [...]

Feb 01, 2018

Women’s History Month Questionnaires

By | February 1st, 2018|Security & Pop Culture|

March celebrates Women's History Month. We want to hear from men and women on their encounters with gender issues in their work lives. It's important to spread awareness about issues you want to see addressed. Now is your chance to use your voice and share with us, anonymously if you [...]

Jan 24, 2018

The Biggest Data Breaches of 2017

By | January 24th, 2018|Ask The Experts, Guest Post, Security & Pop Culture|

This infographic was originally posted on See original post for more detailed information on cyberbullying.   Editor’s Note: This blog article was written by an outside contributor – a guest blogger – for the purpose of offering a wider variety of content for our readers. However, the opinions and [...]

Jan 23, 2018

Data Privacy Day 2018

By | January 23rd, 2018|Security & Pop Culture|

On January 28th America, Canada, and India celebrate Data Privacy Day and Europe celebrates Data Protection Day. Championed by StaySafeOnline in the US, Data Privacy Day is a global effort that allows all of us to come together and encourage businesses who collect data to respect individuals’ privacy. There are [...]

Jan 16, 2018

The Cybersecurity of Cryptocurrency

By | January 16th, 2018|Ask The Experts, Security & Pop Culture|

It seems everyone wants to try their hand at investing in bitcoins, or Litecoins, or other alternative cryptocurrencies. With the value of multiple digital currencies soaring, it’s easy to see why. Value can spike within days, it teaches us about investing - when to buy, when to sell, how stocks [...]

Nov 30, 2017

Happy Computer Security Day!

By | November 30th, 2017|Ask The Experts, Security & Pop Culture, Security Awareness 101, Tips and Tricks|

On November 2, 1988, an unprecedented event occurred. A computer worm named Morris, one of the first of its kind, began making its way across the internet. Estimated to have infected 2,000 computers within 15 hours (which was fast for the ‘80s), Morris compromised 10 percent of the 60,000 systems [...]

Load More Posts