Breach after breach, the same stories are told of gaps in security policy, misconfigured services, social engineering attacks, and inarguably the most difficult source of exploitation to manage: software vulnerabilities.
In 2013, the semi-secret research and development facility Google X started selling a prototype of Google Glass. This wearable device was arguably the world’s first supplemental reality "smart eyeglasses."
Foreign governments are continuously conducting covert operations in the U.S. to gather intelligence about public and private sector organizations. One of the best ways to collect information is through human intelligence, or HUMINT.
We don’t often think of certified public accountants (CPAs) as being stalwarts in corporate cybersecurity. But in today’s world everyone needs to be involved in keeping their systems safe from cyberattacks.