Vulnerability found in two-factor authentication

By | June 10th, 2016|Categories: Blog|

Two-factor authentication is a computer security measure used by major online service providers to protect the identify of users in the event of a password loss. Security experts have long endorsed two-factor authentication as an [...]

C-Suite Strategies for Tackling Healthcare Cybersecurity

By | June 10th, 2016|Categories: Blog|

How will recent legislation, such as The Cybersecurity Information Sharing Act 2015, affect healthcare? What are the current threats against healthcare organizations, and how can they find the right balance between innovation and security?

Global Ship tracking on the Google cloud

By | June 10th, 2016|Categories: Blog|

Six months of global ship tracking AIS data visualized using webgl rendering: 10 million data points dynamically rendered at 60 frames per second using open source canvas layer tool for the Google Maps API. Global [...]