Over the past years, we have been warned from numerous studies about potential job displacement due to ‘automation’ – namely the combination of robotics, artificial intelligence, and other technologies. Even…
Category
TECHNOLOGY
How many times have you heard the phrase “There’s an app for that.”? The truth is that there is an app for almost everything and in one way or another;…
Facebook’s privacy issues have been at the forefront of public discussion over how the political data firm Cambridge Analytica gained access to personal information of approximately 87 million Facebook users…
Technology is changing so rapidly that today’s popular devices may become obsolete in only two years. Technology manufacturers introduce new devices every year that threaten to substitute existing ones instantly.…
Phishing refers to one of the most widely-perpetrated forms of fraud, in which the attacker tries to get confidential and sensitive information, such as login credentials or account information, by…
Introduction Let us start with defining the following important terms; Backup, Information Security, and Information Assurance Backup In Information Technology, a backup is defined as a process of copying and…
Turning security assumptions around and have them work for you in agile. While agile development is going mainstream, information security is having difficulties to keep pace. The result of this…
Today’s digital frontier can be very much likened to the old days of the Wild West. In this present era identified by the ubiquitous nature of the Internet, cyber criminals…
The Rise of Bitcoin Bitcoin is a digital payment system, which was developed by an anonymous programmer or group of programmers who identify under the name of Satoshi Nakamoto. Even…
The increasing nature of cybercrime Application services in the cyberspace have gained a huge importance in our lives expanding beyond the business-to-consumers and consumer-to-consumer models to a form of many-to-many…