Scene I “Dad?” “Hmm..?” the query drew out a grunt from behind the newspaper. “Dad, do you know what Nikhil showed us in class today? It was shocking!” “Really? What was it?” Turning the page. “He has downloaded games and wallpapers and some of them are weird.” “Hmm hmm??” “Dad!!!!” “Yeah, what? Can’t a man […]

Many believe that life is a series of trade-offs. That you actually can’t have it all. You can’t have all the advantages of having children (remind me again!?) and loads of time for yourself. You can’t have a fabulous social weekend and get lots of rest. Well when it comes to online privacy, it appears […]

In case you haven’t noticed, you owe Moore’s Law a belated birthday card. The famed theorem, which set the technology industry’s evolutionary pace by positing that computational power would double every year, turned 50 this year. We in the technology industry owe a lot to Moore’s Law, as it’s given us the foundation on which […]

As cyber criminals move faster and stealthier, taking advantage of new tools provided through an adversarial community, security teams need to be able to respond with equal or greater speed. Every second counts after a cyber attack. Therefore, it is imperative to have a solid plan in place for actions that take place during the […]

Passwords are hard. They can be long, they can be short and they can be filled with numbers, symbols and errant capitalizations. When you add multiple services into the mix, each demanding their own unique password, memorization becomes impossible. Worse yet, if a service is compromised, passwords can become useless. For those reasons, the security […]