Politicians, Twitter, and the Public Record

Submitted by James Azar on Fri, 09/14/2018 - 16:57
Politicians, Twitter, and the Public Record
Politicians, Twitter, and the Public Record

Politicians across the world have embraced Twitter as a way to directly connect with the public.  It’s common for political offices to have an official account that is passed along to the next official. However, in recent years, we’re seeing a new trend: politicians issuing messages about official duties, but from an “unofficial” account. It might be a personal account that the official had before assuming office, or it might be an account that appeared outside official channels.


Smart Cities and Safety

Submitted by James Azar on Fri, 09/14/2018 - 15:48
Smart Cities and Safety
Smart Cities and Safety

With New York and San Francisco ranking as Forbes top two smart cities globally for 2017, ensuring that smart cities are cyber secure is as crucial for national security as preventing malware. 

Smart cities are in a race to increase their efficiency and tech capabilities and keep their top spot on the cyber world stage, nonetheless, they should equally be looking at ensuring their cities are as digitally safe as possible. 

New York:


Is your smart home safe?

Submitted by James Azar on Fri, 09/14/2018 - 15:39
Is your smart home safe?
Is your smart home safe?

The university of Michigan recently found that multiple smart apps and devices have far more access than they really need, to perform necessary functions. This is being termed 'overprivileged' and has caught the fervent eyes of the cyber security community. This is largely because of the gaping hole growing in IOT cyber security.

As the world of IoT expands at an exponential rate, cyber security professionals are concerned that safety is playing second fiddle to consumer desires to stockpile smart goodies.  


The Cybersecurity Scene.

Submitted by James Azar on Fri, 09/14/2018 - 14:01
The Cybersecurity Scene.
The Cybersecurity Scene.

With the growing sophistication of our virtual assets and increasing dependence on IoT products and cloud computing, comes real developments in the Cyber-security landscape.

This has pushed cyber-security issues and hackers into everyday life for almost every type of individual and business.

The level of sophistication of cyber-crime is reminiscent of the shift from street to organized crime. 


The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.

Submitted by CyberHub Summit on Thu, 07/05/2018 - 17:40
The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.
The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.

A huge setback in our web application use is the vulnerability of our data. Traditionally this has been addressed through encryption, more recently 'end-to-end' encryption which by wording alone suggests that we are 'covered' for securing our data.

Well, the wording is misleading because end-to-end encryption has until now, been unable to completely secure data in all conditions.


Kids and Smart Phones.

Submitted by CyberHub Summit on Thu, 06/21/2018 - 16:19
Kids and Smart Phones.
Kids and Smart Phones.

Although there is no legal guideline, the consensus is that our children don’t really need smart phones, not until they are at least twelve, possibly fourteen, or at least, that's what Bill Gates was saying in 2017.


Crypto in the Valley.

Submitted by CyberHub Summit on Tue, 06/12/2018 - 16:44
Crypto in the Valley.
Crypto in the Valley.

In the Startup Tech Capital of the World, it seems only fitting that a new cryptocurrency would spark immediate excitement for potential investors. Silicon Valley leads the world in tech projects and blockchain projects yet, until now, VC (Venture Capital) funding has overwhelmingly gone through traditional funding channels.


What is 'App-ning to our Privacy?

Submitted by CyberHub Summit on Fri, 05/18/2018 - 22:19
What is 'App-ning to our Privacy?
What is 'App-ning to our Privacy?

So, while you are wondering whether you are one of the 87million who had their Facebook information harvested, it's time to let Zuckerberg's Congressional investigation take care of the corporate side and take stock of our own personal responsibility in protecting our data.


How Secure is the BlockChain?

Submitted by CyberHub Summit on Wed, 04/25/2018 - 19:59
How Secure is the BlockChain?
How Secure is the BlockChain?

By James Azar

I want to start by asking you this very question? When you think of BlockChain what’s the first thing that come to your mind? (Comment Below) 

            Survey is most likely to say Bitcoin and Crypto Currency. Why? That’s what we know it as. Recent trends I read, speak and discuss with others is BlockChain is also the safest technology out there. Its already safer than the technology out there today and it can’t be hacked. 

            Let’s analyze this very statement. BlockChain is secure and can’t be hacked.