Op-Ed 5 Compelling Reasons to Get a Cyber Security Certification Predictions for the Future Use of Biometrics Professional Drone Use in the Security Industry New Trends in Smart Cities Include Wireless Broadband How to Remove Malware & Viruses From Android Phones (Oreo Version) Examining the Threat Posed by Cyberattacks Against Critical Infrastructure Life Inside China’s Total Surveillance State Access Control System Design: A single answer for two different questions Ah! The Lunch and Learn – Is it still a valuable tool? Malware Threats and Admin Rights: Friend or Foe Use Big Data Techniques to Track Threats to Your Corporate Data Hiring your first security professional Who Are You Allowing in Your House at Night? Productivity wins when using a cloud terminal server The Great Debate: What Should We Do About the Flash Problem? Essential Security Design Elements Which Candidate Would Be The Most Security Minded President? Everybody has to have an Ashley Madison story, but… What? Hiring a security consultant will save me money? How can that be? When there is a fracture between perception & reality, security suffers Are We Ready To Retaliate Against China?