The Tech Tribune staff has compiled the very best tech startups in Virginia. In doing our research, we considered several factors including but not limited to:
Somewhere there is a graveyard for dead programming languages with tombstones marked "</fortran>."
Every technology has a predictable life cycle, and when one language reaches the end of its modern usability, an alternative needs to step in. However, even retired programming languages still exist in the decades beyond their anticipated expiration as a foundation or teaching tool for other languages.
In a world where devices can have inherent security flaws, how do we make authentication safer?
Traditional cybersecurity measures are being re-examined as new technology, such as internet of things (IoT) devices, creates a larger attack surface and cybercrime incidents become more sophisticated, innovative and damaging.
Great authors don’t reveal too much of the villains, monsters, or evil entities in their work. They learned long ago that the audience is almost always disappointed when they try. As CEO of a cybersecurity vendor with products and services defending government, corporate, and consumer computers all over the world, my colleagues and myself are frequently asked ‘what were last year’s scariest cyber attacks’.
Gift buying and traveling, especially during the winter holidays, creates an environment ripe for cybercrime. During this frenzied period, retailers and hospitality providers must keep their revenue generating systems up and running to keep moving product, charming customers, and making lasting holiday impressions. However, an alarming Cisco survey found that a typical enterprise of any industry is staffed only with enough security analysts to act upon half of its cyber alerts. This could be because many companies believe in a 'detect and react' approach. Unfortunately, cyber criminals can easily take advantage of this lack of security.