“You (as the CISO) have the task of ensuring the social, technological and political landscape of the organization are in tune with the Cyber Threats that present significant risks to the company.” by bits&digits

Read more

“Ashley Madison: Users, and potential clients are presented with the all so common ‘Enter Your Data At Your Own Risk’ style User Agreements.” by bits&digits

Read more

“Zero Knowledge – A Beginners Guide to The Possible Know nothing or Know It All – There are No Secrets II” by bits&digits

Read more

“World Hosting Days (WHD) 2015 Edward Snowden Speech Cross Examination – There are No Secrets” by bits&digits

Read more

“DYI: Low Tech, Low Cost Vehicle Tracking Device – Or Child Device Or ________ Device.” by bits&digits

Read more

“Click the link and “Accept” the malicious code bomb to their computer to wreak irrevocable havoc on a network” by bits&digits

Read more

“Cyber Breach, Hack, Exploit, Bank Heist, Personal Data Stolen – all taglines that we are seeing at an ever increasing rate in the last 5 years.” by bits&digits

Read more

“The findings were of such a large scale both FBI and US Secret Service had assigned resources to this issue.” by bits&digits

Read more

“The solution required a ‘delicate glove’ approach including data collection at multiple locations across the globe.” by J. Tate

Read more