Innovation Becomes the Prime Focus of the Biometric Sensor Industry


Pratik Gundawar, ,

Biometric, biometrics, fingerprints, eyes, blue.

The threat of data theft poses significant challenges to smart device manufacturers. Installation of biometric sensors in devices that unlock and perform various functions based on individual features becomes a necessity. From smartphones to tablets, biometric sensors have played a crucial role in security and other purposes. Hackers are becoming smarter day-by-day and finding new … Read more

What is a Hacktivist?


Patrick Putman, ,

Anonymous Hacktivist Mask

Hacking is no longer just about breaking into a computer to steal money or data. Hackers have developed new methods of influencing policy and bringing about change. Especially with society’s heightened sense of political awareness. Subsequently, they are turning internet activism as a way of spreading their idealism. Simply put, a hacktivist is someone who … Read more

Tips for Millennials on Cybersecurity Practices


Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Millennials on their phones Cybersecurity

Millennials are at risk to be the victim of a cyber-crime. Millennials are in a constant state of media saturation. Growing up, many millennials have been bombarded with dated and cheesy propaganda designed to keep us “cyber safe”. Videos of large, talking computers who rap about the dangers of chat-rooms were a dime a dozen … Read more

From the Winter 2015 Issue

Privacy & Security in the Age of Mobile Communications


Michael Finney, , Mystic Waters Media

Setting the Scene  It was a cool, brisk Autumn evening. My contact had agreed to meet and discuss the subject of this article in a well-lit, public space. After purchasing some smoothies, we sat down outside to conduct the interview. Cameron Banga is an app developer that works in both the iOS and Android platforms. … Read more

From the Fall 2014 Issue

Cybersecurity Culture and Compliance


Dr. Mansur Hasib, CISSP, PMP, CPHIMS, Public Speaker and Cybersecurity Leader,

CYBERSECURITY DEFINED While attending several cybersecurity conferences recently I noticed a lack of a common understanding of what cybersecurity is. I also noticed some confusion between cybersecurity and information assurance. I observed that many cybersecurity professionals and even NIST documents were advocating cybersecurity policy based on the 1991 McCumber model of information security (McCumber, 1991) … Read more