by Design Lead | Aug 2, 2021 | Posts
How To Stop DDoS Attacks By Said El Hachemy August 2, 2021 Hackers are always a step ahead of security measures. As data security quality increases, malicious entities create new methods to outperform those security measures. One of the most common attacks on the...
by Design Lead | Jul 15, 2021 | Newsletters
Is Data Privacy a Sacred Duty for Muslims? 🙏 July 2021 Newsletter Greetings, What do the health sector, faith, and Congress have in common? Digital privacy! Or, well, problems when that privacy is violated. Read on for the latest on digital privacy breaches,...
by Design Lead | Jul 12, 2021 | Data Protection & Privacy, Posts
Malicious Life and humanID: A Better Internet By Evan Walters-Zucco July 12, 2021 The internet is plagued by data collection, data leaks, bots, hacking, and disinformation. Large corporations, such as Google, Facebook, Apple, Amazon, and Microsoft, collect and...
by Design Lead | Jun 30, 2021 | Cybersecurity & Risks, Posts
How to Detect Bots By Megha Patel June 30, 2021 Many online activities, such as playing video games and reading tweets, include the use of programmed bots. A bot is an automated software program that is used to make HTTP requests and to perform repetitive tasks...
by Design Lead | Jun 25, 2021 | Login & Authentication, Posts
Should I Implement SMS Authentication? By Quan Nguyen June 25, 2021 Passwords are terrible at verifying identities. Computers cannot differentiate who is typing an alphanumeric password, so anyone with the information can authenticate themselves as another user. With...