Select Page
The 9 Most In-Demand Programming Languages

The 9 Most In-Demand Programming Languages

1.    SQL It’s no surprise SQL (pronounced ‘sequel’) tops the job list since it can be found far and wide in various flavors. Database technologies such as MySQL, PostgreSQL and Microsoft SQL Server power big businesses, small businesses, hospitals, banks,...
Quantum Computing and the Evolution of Encryption

Quantum Computing and the Evolution of Encryption

Fear sells in the computer security business. And in late 2015 Massachusetts-based Security Innovation got an unexpected boost from one of the scariest organizations around—the National Security Agency. For six years the company had been trying to create a new revenue...
Voice Command Hacks, Coming Soon

Voice Command Hacks, Coming Soon

Voice interfaces are becoming more ubiquitous and are now the primary input method for many devices. We explore in this paper how they can be attacked with hidden voice commands that are unintelligible to human listeners but which are interpreted as commands by...
Your Router Can Be Hacked Into a Global Botnet

Your Router Can Be Hacked Into a Global Botnet

You might want to upgrade the firmware of your router if it happens to sport the Netgear brand. Researchers have discovered a severe security hole that potentially puts hundreds of thousands of Netgear devices at risk. Disclosed by cybersecurity firm Trustwave, the...
Email Security in a Zero Trust World

Email Security in a Zero Trust World

[wp-svg-icons icon=”file-3″ wrap=”h1″] WhitePaper Download The security landscape is more challenging than ever before. Rapidly evolving threats and hackers who are always one step ahead demand a security model that can adapt in real-time....