People Know Their Data Rights, and They’re Here to Play Ball

October 01, 2024 | Katrina Thompson

AI - The Good, Bad, and Scary

April 01, 2024 | Matt Mui

AI and machine learning (ML) optimizes processes by making recommendations for ...

Self-sovereign identities: Whose life is it anyway?

February 01, 2024 | Steve Prentice

The content of this post is solely the responsibility of the author. LevelBlue ...

AI and Privacy - Addressing the Issues and Challenges

January 12, 2024 | Anas Baig

The content of this post is solely the responsibility of the author. LevelBlue ...

What Is Global Privacy Control (GPC), and how can it help you protect your data?

August 03, 2023 | Anas Baig

The content of this post is solely the responsibility of the author. LevelBlue ...

The ethics of biometric data use in security

February 06, 2023 | Devin Partida

The content of this post is solely the responsibility of the author. LevelBlue ...

The ethics of biometric data use in security

February 06, 2023 | Devin Partida

The content of this post is solely the responsibility of the author. LevelBlue ...

9 Ways smart devices can compromise your privacy

January 30, 2023 | Anas Baig

The content of this post is solely the responsibility of the author. LevelBlue ...

Security risks with using Free Step Tracking apps

July 21, 2022 | Danyal Zafar

This blog was written by an independent guest blogger.

How data poisoning is used to trick fraud detection algorithms on ecommerce sites

June 21, 2021 | Theodoros Karasavvas

This blog was written by an independent guest blogger.

Teaching kids internet safety tips for Zoom parties

May 17, 2021 | Devin Morrissey

This blog was written by an independent guest blogger.

Defending the client-side attack surface

May 14, 2021 | Mike Klepper

It is strange to think that not that long ago the Internet was a very different ...

Internet of Things toys are fun but raise privacy and socio-political concerns

October 21, 2020 | Karoline Gore

This blog was written by an independent guest blogger.

How SSH works: Secure Shell explained

May 21, 2020 | Kim Crawley

SSH, otherwise known as Secure Shell, is a common TCP internet protocol that ...

A new twist on “Parental consent”

January 31, 2020 | Bob Covello

An independent guest blogger wrote this blog.

Love your enemies before you destroy them

October 10, 2019 | Allie Mellen

“In the moment when I truly understand my enemy, understand him well enough to ...

Medical apps & privacy: where are we?

September 24, 2019 | Devin Morrissey

Image Source: Unsplash

Cyberbullying and cybersecurity: how are they connected?

August 21, 2019 | Devin Morrissey

Image Source: Pixabay

How to browse the internet anonymously

August 06, 2019 | Mjellma Gonzalez

Browsing privately ensures that no one spies on what you do online. Thanks to ...

Announcing the AlienVault Success Center!

March 07, 2019 | Kenneth Coe

**OSSIM is no longer in use as we focus on delivering enhanced solutions for ...

Time to Cover your Selfie Camera

October 10, 2018 | Bob Covello

I am reading an excellent book named “Cringeworthy: A Theory of Awkardness”, ...

Should the US have Its Own GDPR and Other Questions Surveyed at RSA 2018

May 22, 2018 | Kate Brew

Privacy has always had a degree of overlap with security, however, recent years ...

Cambridge Analytica Debacle -The Definition Of Breach

March 20, 2018 | Laureen Hudson

Pretty much the motto of my profession is “word choice matters.” I say it a ...

Tips To Avoid LOVE-INT On Valentine's Day

February 14, 2018 | Emily Crose

Valentine’s Day; that ever-venerated holiday celebrating human love. On a day ...

Australian Privacy Act Gets New Notification Requirements

February 05, 2018 | Sacha Dawes

With GDPR the focus of many press headlines across the world, you’d think it ...

Keystroke Logging - How it Affects the Online Privacy of Internet Users

November 21, 2017 | Kanika Sharma

Besides being a useful tool to study human-computer interaction, keystroke ...

"Prime"-ing for Amazon and Other IoT Devices

November 14, 2017 | Vineetha Paruchuri

There seems to be all sorts of advice on the Internet on how to secure IoT ...

Achieving Online Anonymity Using Tails OS

October 24, 2017 | Irfan Shakeel

Achieving anonymity while browsing the internet is the main concern for many ...