Programming and Data Interpretation Are the New Literacy
I hung out with @sgharms yesterday and the conversation was stimulating as usual. One of the topics was how essential...
Read more →I hung out with @sgharms yesterday and the conversation was stimulating as usual. One of the topics was how essential...
Read more →New research from EY US shows that cyber attacks are creating serious financial risks. C-suite leaders don’t always agree on...
Read more →Apr 22, 2025Ravie LakshmananCyber Espionage / Threat Intelligence The China-linked cyber espionage group tracked as Lotus Panda has been attributed...
Read more →But only temporarily. During the short period after reading Hitchens, say a couple of hours, or perhaps a few days,...
Read more →Only 29% of all organizations say their compliance programs consistently meet internal and external standards, according to Swimlane. Their report...
Read more →Remember during the election when we were all talking about who was fighting for what? Remember how Obama was claiming...
Read more →Libertarianism is attractive. I find that it functions as a sanctuary for both those unhappy with conservatism (which they often...
Read more →Cybersecurity researchers have discovered a critical vulnerability in WinZip that enables attackers to bypass Windows’ Mark-of-the-Web (MotW) security feature, potentially...
Read more →Many of us in the tech industry fancy ourselves experts on politics and various types of policy–especially taxation. We feel...
Read more →A security architect with the National Labor Relations Board (NLRB) alleges that employees from Elon Musk‘s Department of Government Efficiency...
Read more →I don’t believe men and women in relationships should spend significant amounts of time with people of the opposite sex....
Read more →Asian crime syndicates behind the multibillion-dollar cyberscam industry are expanding globally, including to South America and Africa, as raids in...
Read more →