• Sign In
  • Home
  • News
    • Politics
      • White House
      • Senate
      • House
      • Campaigns
  • Policy
  • Opinion
    • Editorials
    • Op-Eds
  • In Focus
  • Restoring America
  • Magazine
  • Watch
  • Sponsored
    • Examining Tax Reform
    • Fix TSCA
    • National Parks
    • Inside the Corn Belt
  • TWS Archive
Search
LogoWashington Examiner
Subscribe
LogoWashington Examiner
Sign in
Subscribe
  • News
    • Politics
      • White House
      • Senate
      • House
      • Campaigns
    • Business
    • World
    • Investigations
    • Justice
    • Supreme Court
    • Crime
    • Entertainment
    • Washington Secrets
    • Sports
  • Policy
    • Defense
    • National Security
    • Energy and Environment
    • Education
    • Immigration
    • Finance and Economy
    • Healthcare
    • Foreign Policy
    • Tech
    • Infrastructure
    • Space
  • Trump Administration
  • IN FOCUS
  • Opinion
    • Columnists
    • Editorials
    • Think Tanks
    • Beltway Confidential
    • Op-Eds
  • Restoring America
    • Patriotism & Unity
    • Faith, Freedom & Self-Reliance
    • Courage, Strength & Optimism
    • Equality, Not Elitism
    • Community & Family
    • Fairness & Justice
    • Mission
  • Watch
  • Magazine
    • Magazine
    • Quarterly Briefing
    • Archives
    • Games
  • Sponsored
    • National Parks
    • Examining Tax Reform
    • Fix TSCA
    • Inside the Corn Belt
  • Newsletters
More
    Home Authors Posts by Katie Nelson

    Katie Nelson

    18 POSTS 0 COMMENTS
    Unless you delete personal data before you return a rental car, other people may view it, including future renters and rental car employees or even hackers.
    Crime

    How safe is your car from hackers?

    Katie Nelson -
    December 19, 2016 6:21 pm
    0
    Algorithms now have the ability to recognize us not just by our faces, but also by our posture and smiles. They can recognize us whether we're moving or standing still, and even if our hair is obscuring our faces.
    News

    Biometrics: Safety, convenience and combatting data theft

    Katie Nelson -
    September 26, 2016 3:42 pm
    0
    The documents were posted to a Wordpress blog administered by
    Magazine

    The new weapon against hackers: Cybersecurity startups

    Katie Nelson -
    June 27, 2016 4:01 am
    0
    While fewer people nowadays will run a program from someone they don't know, it is still common practice to open a document or attachment from an unknown source, HP says.
    Magazine

    Watch out for these top hacking risks

    Katie Nelson -
    May 23, 2016 4:01 am
    0
    Others argue that AI has yet to be developed that can accurately mimic the value or depth of a threat. Information Age editorial director Ben Rossi makes the case that humans are needed to create the artificial intelligence that can identify and shut down attackers. (istock photo)
    Magazine

    Is artificial intelligence the next step in cybersecurity?

    Katie Nelson -
    April 25, 2016 4:01 am
    0
    The initiative would include
    Campaigns

    Why one of the top national security issues is missing from the campaign trail

    Katie Nelson -
    March 21, 2016 4:01 am
    0
    Protesters assembled in more than 30 cities to lash out at the FBI for obtaining a court order that requires Apple to make it easier to unlock an encrypted iPhone used by a gunman in December's mass murders in California. (AP Photo/Eric Risberg)
    Magazine

    When it comes to cybersecurity, knowledge is power

    Katie Nelson -
    February 29, 2016 5:01 am
    0
    Norton's cybersecurity insights report for 2016 showed that 15 percent of baby boomers have disclosed an online password to someone else. For millennials, that figure was a whopping 31 percent.
    Magazine

    Why millennials (not baby boomers) are most at risk for hacking

    Katie Nelson -
    November 30, 2015 5:01 am
    0
    On Oct. 20, the National Cybersecurity Institute in Washington will hold its 2015 summit on cyber liability insurance as well as cyber risks.
    Magazine

    The 5 cyber habits you should be following

    Katie Nelson -
    October 19, 2015 4:01 am
    0
    Magazine

    China’s cybersecurity law — trouble for businesses

    Katie Nelson -
    September 8, 2015 4:01 am
    0
    12Page 1 of 2
    LogoWashington Examiner
    Do Not Sell or Share My Personal Information
    Facebook
    Twitter
    Youtube

    NEWS

    • Politics
      • White House
      • Senate
      • House
      • Campaigns
    • Business
    • World
    • Investigations
    • Justice
    • Supreme Court
    • Crime
    • Washington Secrets
    • Entertainment
    • Sports

    POLICY

    • Defense
    • National Security
    • Energy
    • Immigration
    • Finance and Economy
    • Healthcare
    • Foreign Policy
    • Tech
    • Infrastructure
    • Space

    COMMENTARY

    • Columnists
    • Editorials
    • Think Tanks
    • Beltway Confidential
    • Op-Eds

    RESTORING AMERICA

    • Patriotism & Unity
    • Faith, Freedom & Self-Reliance
    • Courage, Strength & Optimism
    • Equality, Not Elitism
    • Community & Family
    • Fairness & Justice
    • Mission
    • WATCH
    • IN FOCUS
    • NEWSLETTERS
    • MAGAZINE ARCHIVE
    • Policies and Standards
    • Terms Of Service
    • Subscription Terms of Use
    • Privacy Policy
    • Your Privacy Choices
    • Transparency In Coverage
    • Advertise
    • Subscribe
    • Contact
    • Careers
    • Staff
    • About Examiner
    • Facebook
    • Twitter