In January 2014, SAE International, formerly known as the Society of Automotive Engineers, classified the future of the automobile. A system was developed defining six levels of automated driving from SAE Level Zero (no automation) to SAE Level 5 (full vehicle autonomy). It has since become one of the most…
Tag
Threats
2020 was a significant year for individuals and businesses alike. It was a year in which all aspects of our lives were drastically affected, exposing our collective fragility and increasing feelings of fear and uncertainty. The COVID-19 outbreak forced people’s lives to move online, both at work and in person,…
What Every Healthcare Organization Should be Doing Now Healthcare has always intrigued me, not just as a career choice but as a patient. The amount of technology to support the patient experience, improve clinical outcomes, and support value-based care is enormous. While COVID-19 has forced healthcare institutions to pause on…
An ethical hacker, a developer, a system engineer and an auditor walk into a bar…you think it‘s a joke, right? It is not the typical set of people having a drink at the bar. And from a professional point of view and with 20+ years of experience in IT and…
The increasing rate of cyberattacks on organizations around the globe has produced huge financial gains for cybercriminals. The vast number of threats includes “Insider attacks,” “Malware,” and now the emergence of COVID-19 threats to mention a few. If these threats are not addressed, there is a likelihood that some organizations…
What we refer to as Cyberspace is in fact the totality of interactions between people, services, software etc. on the Internet. Cyberspace as such, does not exist in any physical form, and thus it is often perceived as this abstract notion which signifies processes, actions and platforms, exchanges and online…
The philosopher Santayana is famous for having once warned: “Those who cannot remember the past are condemned to repeat it.” Recent events have provided several sobering examples of just how true that is. The Apple-FBI dispute was perhaps one of the most recent, painful examples we’ve witnessed a debate the…
In 2016, data breaches remain one of the most significant challenges facing law firms and government agencies. Cybercriminals target law firms and government agencies due to the value of the intellectual property and sensitive information that they maintain. Since 2013, for the industries being tracked, approximately five (5) billion data…