Why I’m giving up on Twitter conversations

Twitter logo

I love Twitter, have been using it for years, and my Twitter account is much more active than my LinkedIn or Facebook. I use it regularly to share my latest articles with my followers, share links to other scoops and articles that are worth reading, post amusing comments on others’ posts, or simply vent my frustration when a particularly complicated article is giving me a hard time.

But Twitter gets frustrating as soon as exchanges start to get technical and lengthy in nature. And my latest episode happened yesterday, after VentureBeat ran my latest article, which explored the intersection of blockchain and cybersecurity. Continue reading

Advertisements

What are you looking at?

Human eye

By Bryn Farnsworth, iMotions

That’s been the question that has been asked by psychologists and market researchers for decades, and the answer has reliably come from eye tracking technology. Now, as more and more of the devices that we use—from our phone to our car—seek to understand how we interact with the world, eye tracking is being used more than ever.

There are a lot of things happening right now as you look at this screen: Your eyes are tracking the words, and maybe they’re searching for the header, or furtively glancing at the sidebar. This kind of information is critical to market researchers and businesses, who strive to understand how users make decisions (and which of those decisions leads to a purchase). Continue reading

The threat within: Understanding how to defend against the insider threat

Insider threat

By Gary Southwell, Seceon

The insider threat has become one of today’s most pressing cyber security concerns. In 2016, the Insider Threat Report Spotlight found seventy-four percent of organizations feel vulnerable to insider threats—a dramatic year-over-year increase. However, less than half of all organizations (42 percent) have the appropriate controls in place to prevent an insider attack. The survey also provides greater insight on the source of the threats:  “Privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations (60 percent). This is followed by contractors and consultants (57 percent), and regular employees (51 percent).” Continue reading

How to protect yourself against WhatsApp’s non-present backdoor

Secure messaging app

In a controversial Friday 13th scoop, The Guardian unveiled a backdoor in WhatsApp, the popular messaging app owned by Facebook that has over 1 billion users and touts having unbreakable security.

Within a few hours of the Guardian report, the claim was debunked by other outlets, including this detailed piece in Gizmodo. While it is now clear that the backdoor is actually not a backdoor but a natural functionality of the messaging app, here’s what you need to know and what you can do to protect yourself from potential security mishaps. Continue reading

How blockchain can improve cybersecurity

blockchain-security

Our increasingly connected and digital lives are making us more vulnerable to cyberattacks than ever. As was the case in previous years, 2016 saw a spate of cyberattacks of unprecedented proportions. Some of these incidents were a reminder that the internet is no longer fun and games.

What we also learned was that the current infrastructure that powers our current local and global networks might no longer be able to sustain the new generation of attacks and threats.

Enter the blockchain, the distributed ledger that underlies the popular and controversial Bitcoin cryptocurrency, the technology that is the result of decades of research in cybersecurity and cryptography. Continue reading

This Is Why The Internet Is Broken: A Technical Perspective on Net-Neutrality

world wide web

By Gur Shatz, Cato Networks

Anyone with hands-on experience setting up long-haul VPNs over the Internet knows it’s not a pleasant exercise. Even factoring out the complexity of appliances and the need to work with old relics like IPSEC, managing latency, packet loss and high availability remain huge problems. Service providers also know this — and make billions on MPLS.

The bad news is, it doesn’t matter that available capacity has gone up. The problem is twofold: the way providers are interconnected and mismanagement of global routes. The same architecture that allowed the Internet to cost-effectively scale to billions of devices also set its limits. Continue reading

What is eye tracking technology?

Source: iMotions

Source: iMotions

Imagine scrolling an online news article by merely staring at the bottom of the webpage. How about reorganizing your desktop files by dragging them around with your gaze?

For years we’ve been using mice and keyboard (and later touch screens) as the main tools to control and send commands to our computers and devices.

But 2016 proved that things are headed for a change. With great leaps in artificial intelligence and machine learning, we saw a new array of highly efficient assistants and devices that can be controlled with voice commands.

The start of 2017 gave a hint at what the next breakthrough might be. Continue reading