Another Breach of Data Stored In The Cloud. Please stop.
I have a love-hate relationship with ”the cloud”. I love how easy it is to create services, easily access software and data, and I love the easy sharing of data. But I seriously hate how easy it is to unintentionally expose data that should remain confidential. In April of this year, the Telegraph reported on […]
Physical Security is Still Important, Maybe it is More So Than Ever Before
I taught Learning Tree’s Cyber Security Introduction from my office studio recently. The course participants had one thing in common with every other group to which I’ve delivered that class: they really weren’t interested in physical security. I tried to change their minds. Along with the usual activity where a Windows device is booted from […]
Why Order Matters
While it may seem strange, sometimes it is possible for a mathematical expression to have two different right answers. Consider: This expression has been discussed on the Internet since 2011! The correct answer could be either 2 or 288. Really. It depends on how the expression is evaluated. To understand that we have to understand […]
The Brave Web Browser: Faster and More Secure
It is a Brave new (browser) world out there. Almost since the start of the World Wide Web, users have had different preferences of how to access it. Some like Firefox, some Safari, some Chrome, some Opera, some Chrome, some… You get the picture. The “browser wars” ebb and flow in intensity. A relatively new […]
What is Credential Stuffing and Why Should I Care?
You should know by now that using common passwords is a bad idea. And you may have heard of recent password breaches and that you should change passwords on breached sites. But there is an additional threat: credential stuffing. Whenever there is a breach where usernames or email addresses are disclosed and can be matched […]