Op-Ed Deception 101: An effective way to understanding deception and chose an appropriate vendor The Growing Popularity of Smart Phones as Access Control Credentials Cryptography, Paper Gangsters, and the Blackberry Enterprise Server Long Con SIA’s Megatrend: Cyber Meets Physical Security The Missing Link for the UAS Industry RottenSys Infects Nearly 5 Million Devices Paypal Shares Your Data with a few Third Parties – More than 600 in fact Belgium Privacy Watchdog Takes 100 Million Exceptions to Facebook’s Illegal Stalking Enterprise costs of DDoS attacks exceed $2Mil – Cerero Expert Comments The US Government Should Have Access to All Encrypted Devices of US Citizens 5 Compelling Reasons to Get a Cyber Security Certification Predictions for the Future Use of Biometrics Professional Drone Use in the Security Industry New Trends in Smart Cities Include Wireless Broadband How to Remove Malware & Viruses From Android Phones (Oreo Version) Examining the Threat Posed by Cyberattacks Against Critical Infrastructure Life Inside China’s Total Surveillance State Access Control System Design: A single answer for two different questions Ah! The Lunch and Learn – Is it still a valuable tool? Malware Threats and Admin Rights: Friend or Foe Use Big Data Techniques to Track Threats to Your Corporate Data Hiring your first security professional Who Are You Allowing in Your House at Night? Productivity wins when using a cloud terminal server The Great Debate: What Should We Do About the Flash Problem? Essential Security Design Elements Which Candidate Would Be The Most Security Minded President? Everybody has to have an Ashley Madison story, but… What? Hiring a security consultant will save me money? How can that be? When there is a fracture between perception & reality, security suffers Are We Ready To Retaliate Against China?