digital security

The hackers have "a perfect business model."
The "see-Ma, no-hands" automated reporting movement has been used by AP, Bloomberg and Thomson-Reuters in crunching numbers -- business figures and sports scores -- as well as turning out formulaic stories.
The unprecedented rise of the connected age, like any big societal change, leads to unexpected and dramatic questions about safety and security. But the concept of security requires innovators and their products' users to work together.
Well, this was the year that Cyber-security (personal security) became Paramount in people's mind-share. Whether it was Target, Home Depot, Equifax, Sony, JP Morgan, and the list does not stop there.
In today's day and age, with technology at our fingertips (quite literally) there has been a bit of an invasion of our personal space and our privacy. Some of it is by our choosing, some of it not so much.
The sheer amount of personal information we are generating and sharing online underscores some of the biggest security challenges we are currently facing. How do we control what this data is being used for?
The difficult-to-notice vulnerability of Heartbleed had been there for years before the greater threat was announced to the general public. Now that everyone knows it exists, companies are scrambling to fix it.
Martus enables human rights defenders on the front lines of fighting abuse to stay safe and protects the identities of those who would face violence and repression for telling their stories.
The methods I used as a civilian keep me on the right side of the law. The corruption I fought was in the private sector. I walk free, albeit monitored by the military, police, and various other entities. Bradley doesn't share that blessing of freedom with me.