Naval AI Application: Unmanned Submarines
AI is a massively growing field in this nation and abroad. There are a few fields this is not applicable to. The application itself...
Consumers Targeted Again: Android Phones with Pre-Loaded Malware
Generally, when a consumer purchases their new smartphone, the routine is set. The phone is purchased, the consumer is rather exuberant,...
Connect with your InfoSec department.
With any project involving IT assets, there is a process to have the plan/process approved. This procedure is in place to keep the...
Atlanta: Issues, Part II
The city of Atlanta operations had been severely crippled in March 2018, arising from a rather serious and in-depth ransomware attack....
California’s Version of GDPR: Applicable to Consumer Embedded Systems?
California recently passed an aggressive data privacy law. The California legislature passed AB375 (The California Consumer Privacy Act...
Please investigate third party vendors with any computer or network access
Over the last five years there have been many, many corporate data breaches. These have been published and republished numerous times....
Technology Advancement Tempered with Prudence
Technology is advancing at such a fantastic rate. The pace at time is difficult to manage. These advances have the distinct possibility...
Another tool for monitoring insider risk
The risk to an organization is manifested in many different packages and from many sources. One particularly poignant area of potential...
Cybersecurity, the aviation industry, and AI
Aviation's prevalence and use for consumer and commercial uses is well-known. The noted parties are not always able to drive to their...
Another defense to ransomware
Ransomware continues to be a relative nightmare. These have the ability to quickly ruin the CISO’s day and wreak havoc on operations. A...