Hackers have evolved their methods, from regular phishing attacks to spear phishing, where they use email messages disguised as coming from legitimate sources to dupe specific individuals. This is why the global spear phishing protection software market is estimated to reach $1.8 billion by 2025.

Previously I discussed how my anxiety, beginning with a worry that I’m not “doing enough,” can fuel my proactive tendencies, leading to higher performance at work. What I hadn’t considered is my team can interpret my personal feeling of not doing enough as an indicator that they are not doing enough. —Sam Knuth

There was a December article in Fast Company that spelled out what I’ve long suspected – that many big companies have lousy customer service on purpose – they want to make it hard for customers to get refunds or to drop service. —Doug Dawson

Cybersecurity professionals, and the employees and consumers they serve, all engage in risky security practices. Data shows password issues continue to plague users of all experience levels, two-factor authentication adoption is lagging, and mobile devices are introducing new challenges. —Kelly Sheridan

For decades, I have been talking about the importance of individual privacy. For almost as long, I have been using the metaphor of digital feudalism to describe how large companies have become central control points for our data. —Bruce Schneier

Over the past decade, technology start-ups grew so quickly that they couldn’t hire people fast enough. Now the layoffs have started coming in droves. —Erin Griffith

About half predict that humans’ use of technology will weaken democracy between now and 2030 due to the speed and scope of reality distortion, the decline of journalism and the impact of surveillance capitalism.

First, there’s heterogeneous integration at the chip level – the device level. Second, there’s heterogeneous integration at the system level. And third, there’s heterogeneity at the software level. Heterogeneity at all three levels lead to system reconfigurability.

Not all attackers are trying to exfiltrate data. In security, we’re all familiar with CIA triad—confidentiality, availability, and integrity. —David Lu

The climb is getting steeper, but thanks to hard work, vision and insight are much keener. At ML:4, all assets are scanned by a combination of agent and remote scans on a normal cadence. This will generate a lot of data dictated by threat and patch priority. —Lamar Bailey