Karen Epper Hoffman

Most Recent Articles by Karen Epper Hoffman

Going Soft: Nation-state attackers seek weaknesses in the system

When nationally backed bad actors from other countries seek areas to infiltrate, they are looking for areas where they not only can get in, but they can make a big impact. Other than critical infrastructure, nation-states may also try to wheedle their way into financial systems, mobile applications, election technology, and ultimately, IoT devices.

Austin: Securing the Smart City, Texas Style

Managing the greater complexity and more constant demands of the so-called smart city, particularly making sure the collected data makes transit safely and is not altered or stolen, can be even more challenging than it may sound.

Going dark

This largely undiscovered portion of the Internet does serve another larger role in connecting its users.

The big ask: Government requests

What issues should companies be considering when it comes to handing over privileged information? Karen Epper Hoffman investigates.

Permission denied?: Mobile application security

Mobile application security is becoming a tougher battle to wage for organizations, as these apps are demanding more access to users' data, reports Karen Epper Hoffman.