The maelstrom of change we're going through presents a unique opportunity to become enablers. And to do that requires flexibility.
Read moreThe Detroit man allegedly bragged about wanting to "play with Peoplesoft" - the HR management software he called "basically HR in a box."
Read moreIdentifying a Person Based on a Photo, LinkedIn and Etsy Profiles, and Other Internet Bread Crumbs
June 22 2020Interesting story of how the police can identify someone by following the evidence chain from website to website. According to filings in Blumenthal's case, FBI agents had little more...
Read moreWith millions working from home and relying on the cloud, security leaders are under increasing pressure to keep their enterprises breach-free.
Read moreMonday review – the hot 16 stories of the week
June 22 2020Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.
Read moreHundreds of thousands of potentially sensitive files from police departments across the United States were leaked online last week. The collection, dubbed "BlueLeaks" and made searchable via a new...
Read moreFourteen feet long and 450 pounds. It was dead before it washed up. As usual, you can also use this squid post to talk about the security stories in...
Read moreAustralian Government Under Ongoing Cyberattack
June 19 2020Experts believe China is behind the attack campaign, but China denies responsibility.
Read moreAs telehealth grows more common, security experts address the privacy and security concerns of storing health data in the cloud.
Read moreTurn on MFA Before Crooks Do It For You
June 19 2020Hundreds of popular websites now offer some form of multi-factor authentication (MFA), which can help users safeguard access to accounts when their password is breached or stolen. But people...
Read more
Recent Comments