The Internet of Things (IoT)

The increasing popularity of interconnected technologies should be tempered with the need to ensure that such devices are designed with security in mind. The term the ‘Internet of Things’ or IoT is not a new concept, having first become popularized almost two decades...

Location Tracking with Ultrasonics

Ultrasonic cross-device tracking – the name itself sounds disturbing and frankly this developing technology for location tracking and monitoring using mobile devices is pretty worrisome. Now uXDT, as it’s known, is becoming a reality that we should all be aware...

Data Security at the DISCO

When addressing the issue of data security and compliance, one of the strategic challenges facing businesses today is an over reliance on a wide variety of IT and security technologies, spread across the organization, and supported by a plethora of different vendors....

Who Are ‘The Bad Guys’?

According to Cap Gemini’s 2016 World Payments Report, the Payment Card Industry is worth some $426 billion globally and, in the US alone, the value of payment card and identity theft is estimated to be $16 billion. Of the 4.2 billion records exposed through one...

How ‘Dark’ is The Dark Web?

In his 2015 Ted talk, ‘How the Mysterious Dark Web is Going Mainstream‘ Jamie Bartlett proposes that, if you want to buy high quality, low priced cocaine, there really is only one place to go and that is the dark net, anonymous market known as The Dark...

What is PCI DSS?

For consumers, access to credit and debit cards (collectively ‘Payment Cards‘) offers highly attractive benefits when paying for goods and services such as not having to carry cash, deferred payments and the option to pay for things over time. And for the...