Hacking Christmas Gifts: Remote Control Cars

Hacking Christmas Gifts: Remote Control Cars

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward their possible security implications. Some of the risks discussed in this series may be over the top and even…

Read More

A Different Kind of Virus – A Review of Ransomware in 2020

A Different Kind of Virus – A Review of Ransomware in 2020

As if dealing with COVID-19 were not enough, 2020 turned out to be a banner year for another troublesome strain of virus— ransomware. Malicious actors grew more sophisticated, daring and brutal. They also hit a number of high-profile targets. For those of you who didn’t keep up with all of the developments in the ransomware space, we’ve broken down some of the most important events and trends of the year here. Growing in Scale and…

Read More

5 reasons why scams survive, thrive, and succeed

5 reasons why scams survive, thrive, and succeed

5 reasons why scams survive, thrive, and succeed | 2020-12-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Five steps to secure your business – From the C-suite to the assembly line

Five steps to secure your business – From the C-suite to the assembly line

Five steps to secure your business – From the C-suite to the assembly line | 2020-12-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Implementing Security on All Edges

Implementing Security on All Edges

Hybrid networks, multi-cloud, Internet-of-Things, remote work and digital innovations are all driving more distributed networks and a much more expansive attack surface. The network perimeter that used to be so clearly defined now extends across a spectrum of enterprise facilities, branch offices, homes, other remote locations and multiple clouds.  The reality is that security needs to be on the LAN edge, WAN edge and cloud edge.  All edges must now be secured, but how do…

Read More

Top 5 ways to protect MFA codes

Top 5 ways to protect MFA codes

Using SMS for multi-factor authentication is helpful, but not always secure or reliable. What if you lose your phone? Tom Merrittlists five additional ways to receive MFA codes, without SMS. Someone wrote in, after seeing my Top 5 about avoiding using SMS for multi-factor authentication, and asked, “Do you have any suggestions on how to protect myself from getting locked out of my accounts if my phone disappears or dies?” Great question. One advantage of…

Read More

Internet 2021: Here’s what the new year will (and won’t) bring | ZDNet

Internet 2021: Here’s what the new year will (and won’t) bring | ZDNet

I’m lucky. I have decent cable internet to my home office. It’s not cable gigabit, which is not the same thing as real fiber gigabit, but at 300Mbps, it’s more than good enough. But, most people aren’t so lucky.  The FCC official broadband definition is a mere 25 Mbps down and 3 Mbps up. Soon to be out of office FCC chairman Ajit Pai would like to have reduced that number to 10 Mbps in…

Read More

To Share, Or Not to Share – Cyber Defense Magazine

To Share, Or Not to Share – Cyber Defense Magazine

As consumers’ views on personal data evolve, it’s time to re-think data privacy By Kris Lovejoy, Global Consulting Cybersecurity Leader, EY Today organizations are standing at a crossroads when it comes to data privacy. In one direction, a series of high-profile data breaches and scandals in recent years has eroded consumers’ trust in organizations and led to them becoming ever more vigilant about their privacy. This consumer vigilance, combined with a regulatory drive to tighten…

Read More

Docker Captain Take 5 – Gianluca Arbezzano – Docker Blog

Docker Captain Take 5 – Gianluca Arbezzano – Docker Blog

Docker Captains are select members of the community that are both experts in their field and are passionate about sharing their Docker knowledge with others. “Docker Captains Take 5” is a regular blog series where we get a closer look at our Captains and ask them the same broad set of questions ranging from what their best Docker tip is to whether they prefer cats or dogs (personally, we like whales and turtles over here)….

Read More

How to create a good privacy policy for your website: Tips from the Better Business Bureau

How to create a good privacy policy for your website: Tips from the Better Business Bureau

The BBB provides recommendations on what to include in your business website’s privacy policy. Image: Getty Images/iStockphoto The Better Business Bureau (BBB) has a novel idea: Write an understandable privacy policy for business websites and don’t hide the document on the last webpage in barely readable print. That said, first things first–from the BBB article BBB Tip: Writing an Effective Privacy Policy for Your Business’ Website: “Whether you are processing credit-card payments, saving shipping or…

Read More
1 3,314 3,315 3,316 3,317 3,318 3,468