electric car energy grid

Supercharging the Energy Grid

The world's aging grids will be costly to repair and upgrade.…
red car disappearing transportation wheels

Your Car is Not a Mode of Transportation (Part 1)

CAV Series Part 1: What makes a car connected or autonomous Welcome…
rain digital cyber environment

Cybersecurity Insurance and Analyzing the Risk

In order to be prepared to deal with a breach, companies…
cryptocurrency wallet

Storing Cryptocurrency: What the Hot and Cold Talk is About

When it comes to traditional forms of money like the dollar…
kakaotalk-blog-header

Why the Education Industry May Be a Hacker's #1 Target

Most readers of the news are no strangers to the cyberattacks…
women in cybersecurity five colorful

The Women Running the Cybersecurity Industry

In 2013, Frost & Sullivan published a report that stated…
search engine magnifying glass and a lock security overlapping venn diagram

SEO and Security: Exploring the Overlaps

When it comes to a company’s website, it’s a no-brainer that…
GDPR Consent and User Data Mining

GDPR: Keeping the Value Exchange Alive

The informational world is an economy, and the content that…
Digital Waves

Uncovering Threats to Data Integrity Embedded in AI

AI and IoT integrations in intelligent transport systems, smart…