CYBERSECURITY ESSAYS

Hat-Canary2.jpg

Visceral and Vested:
What's the Risk?

When a malicious intruder breaches a corporation’s data infrastructure, many things can happen, much of which depends upon the overall perception of harm.

Welcome to Oceania_edited.jpg

Data Rights Matter!

Take back your data. Use encryption, avoid the seductive "free" services, use anonymous search engines, and issue takedowns to the big tech companies wherever your data appears without your permission.

BigBroApple.jpg

Do You Trust Apple?

Apple's new Child Protection features have raised security concerns about the data we entrust to Apple devices and services. Indeed, there is much grist to grind about this thorny issue, and this is not the first time privacy concerns have arisen around cloud storage in general and Apple's iCloud services in particular.