How Tweet It Is

Twitter was once a quirky little social media platform that challenged folks to express complete thoughts in 140 characters or less. Maybe you’ve heard of it? It seems to have been deployed as a weapon of misinformation across our political processes, though no social media platform (or user, for that matter) is without some responsibility.

Hacking Provokes New Perspective

The power we wield in a digital world can sometimes make us feel bulletproof, like our organizations can conquer the world. To some extent this is true. We do more in less time, enjoy global connectivity, and open the world to new information and transformation. And then we get hacked and it all begins to […]

The Snarky Fitband

There have been reports of IoT-connected thermostats offering judgmental comments to their owners returning home to the nest a little later than usual. “Home kinda late, don’t you think,” one display read, and “Where do you think you’ve been,” read another. AI should improve the syntax over time, but the comments struck a chord nonetheless.

Hey Alexa, How Do You Spell Sabotage?

Ever have one of those mind-melding journeys through time and space when it feels like someone is reading your mind, where your every thought manifests itself in unpredictable ways? You have if you use a smartphone, and especially if you engage social media on that smartphone. And it’s not really unpredictable. It’s commercial.

Exposure Of Digital DNA

The latest revelation about consumer-level DNA mapping — the kind advertised on television that track your origin back to exotic and unexpected continents — is the evolution of a database that exposes both the unsuspecting and the suspicious. Adopted children are reacquainted with birth parents seven decades removed and introduced to sisters that look just […]

Light The Candles Of Cybersecurity

As we approach our national birthday, now 242 years in the making, let’s look at the trends and expectations settling out there on the horizon. Threats are up, breaches are increasing in size and scope, ransomware is hitting public and private organizations, and researchers struggle to keep pace with the clever people with bad intentions. […]

All That Glitters Is Not Gold Lowell

The City of Atlanta was recently the victim of a ransomware attack. As reported by Wired and others, Atlanta paid over $2.7 million dollars in consulting and legal fees to settle a $52,000 ransom. The malware used was of the SamSam strain, and experts at SecureWorks, the response firm working with the City,

A Bite Of The Apple

One of Apple’s many selling points, beyond the cool factor and lifestyle connectivity, is the relative security of Apple products, partly because of architecture and partly because their market share of end users remains relatively low. More people, it seems, prefer other hardware and operating systems. The only outlier may be the iPhone, so let’s […]

Do You Have Gas?

Let’s be honest. There are worse predicaments than having gas. One of them, perhaps, is not having gas. Another is surrendering to some bad actor the capacity to determine whether or not you have gas. The boys at the fourth grade lunch table would snicker and call it strategic flatulence, but we’re not in the […]

The Subtle Irony Of Cybersecurity

You are the master of the manor, the king of the castle, and you will deploy the greatest weapons in your vast arsenal to protect your business, your people, and your customers. Back in the day, your would wrap your soldiers in chain mail and the heaviest of protective layers, and you would call it […]