Innovation Becomes the Prime Focus of the Biometric Sensor Industry

Author(s):

Pratik Gundawar, ,

Biometric, biometrics, fingerprints, eyes, blue.

The threat of data theft poses significant challenges to smart device manufacturers. Installation of biometric sensors in devices that unlock and perform various functions based on individual features becomes a necessity. From smartphones to tablets, biometric sensors have played a crucial role in security and other purposes. Hackers are becoming smarter day-by-day and finding new … Read more

What is a Hacktivist?

Author(s):

Patrick Putman, ,

Anonymous Hacktivist Mask

Hacking is no longer just about breaking into a computer to steal money or data. Hackers have developed new methods of influencing policy and bringing about change. Especially with society’s heightened sense of political awareness. Subsequently, they are turning internet activism as a way of spreading their idealism. Simply put, a hacktivist is someone who … Read more

Public WiFi: What is the Risk?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

WiFi is a lot like water. It is available almost everywhere and probably should be free. Unfortunately, a lot of times it is not safe to drink free water. Water that is sourced from a stream might be dirty, and unless you have a water purification system, it is not a good idea to drink … Read more

Tips for Millennials on Cybersecurity Practices

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Millennials on their phones Cybersecurity

Millennials are at risk to be the victim of a cyber-crime. Millennials are in a constant state of media saturation. Growing up, many millennials have been bombarded with dated and cheesy propaganda designed to keep us “cyber safe”. Videos of large, talking computers who rap about the dangers of chat-rooms were a dime a dozen … Read more

From the Fall 2014 Issue

Cybersecurity Culture and Compliance

Author(s):

Dr. Mansur Hasib, CISSP, PMP, CPHIMS, Public Speaker and Cybersecurity Leader,

CYBERSECURITY DEFINED While attending several cybersecurity conferences recently I noticed a lack of a common understanding of what cybersecurity is. I also noticed some confusion between cybersecurity and information assurance. I observed that many cybersecurity professionals and even NIST documents were advocating cybersecurity policy based on the 1991 McCumber model of information security (McCumber, 1991) … Read more