TTS 2022 schedule is NOW LIVE. View and Download


The Need For A Top Down Enterprise Security Strategy

Existential Threats Posed by Connected Technology -- Leaky Operating Systems & Intrusive Apps

In today’s connected world, operating systems and apps are designed to enable the OS and app developer, including those from adversarial countries, to monitor, track and data-mine the end user for financial gain, posing numerous cybersecurity and privacy threats to the end user, including the end user’s employer.

See More

Tech-Based Hybrid Warfare: The Need for Endpoint Cybersecurity

Threats posed by nation-state hackers and intrusive apps are a result of “tech-based hybrid warfare” being waged by China, Russia, North Korea, Iran and other bad actors worldwide who are exploiting vulnerabilities within operating systems and popular apps that are distributed by Google, Apple, & Microsoft.

– By Rex M. Lee

See More
Twitter feeds