Cybersecurity Mesh: IT’s Answer to Cloud Security
April 4 2022With a properly functioning cybersecurity mesh architecture, one can guarantee safe, authorized access to data from any access point.
Read moreWith a properly functioning cybersecurity mesh architecture, one can guarantee safe, authorized access to data from any access point.
Read moreWyze ignored a vulnerability in its home security cameras for three years. Bitdefender, who discovered the vulnerability, let the company get away with it.
In case you’re wondering, no,...
Read more
Backups aren't just limited to hard drives, databases and servers. This Tech Tip describes how organizations should expand their backup strategies.
Read moreTwo new bugs in macOS and iOS disclosed this week add to the growing list of zero-days the company has rushed to patch over the past year.
Read moreNew research on the changing migration of the Doryteuthis opalescens as a result of climate change. News article: Stanford researchers have solved a mystery about why a species of squid native...
Read moreEven the NSA has a malicious insider problem. The employee used his personal emails to send classified data to unauthorized outsiders on 13 different occasions.
Read moreThe updated security payment standard's goal is to “address emerging threats and technologies and enable innovative methods to combat new threats” to customer payment information, the PCI Security Standards...
Read morePublic policy proposals must consider technical, practical, and real-world security effects, and make sure we avoid unintended consequences.
Read morePublic policy proposals must consider technical, practical, and real-world security effects, and make sure we avoid unintended consequences.
Read moreThese techniques are not new, but they’re increasingly popular:
…some forms of MFA are stronger than others, and recent events show that these weaker forms aren’t much of a...
Read more
Recent Comments