Information Leakage From Radio-Frequency Emissions
If you’ve taken Learning Tree’s introduction to cybersecurity course, you may remember that it explains some ways attackers can see what a user types on a keyboard. Those are examples of “information leakage”. It also may be possible for an attacker to use an inexpensive USB radio dongle device or even-WiFi to capture and decode […]
How Should I Dispose of My Old Electronics (That May Have Passwords In Them)?
Recycling is good. I even wrote about recycling your devices a couple of years ago. Just recently the US Computer Emergency Readiness Team or US-CERT (part of the US Department of Homeland Security – DHS) issued Security Tip ST18-15 on Proper Disposal of Electronic Devices. Given that new “Tip” and the fact that this is […]
What If Your Child’s (Or Your) School Doesn’t Teach Coding?
A parent at a recent meeting I was attending lamented that her child’s school no longer taught coding. I was blessed that my high school offered classes in programming back in 1973. I wrote about that six years ago on this blog. Today, I’d like to offer some suggestions to that parent and to any […]
What Cybersecurity Threats Do We Face In The Cloud?
Last week I wrote that compliance and complacency are major challenges in the cloud. Yes, defensive technology is the same. However, the cloud poses some specific threats. Multitenancy Multitenancy scares people the most. You share cloud infrastructure with other customers. Your cloud services are running on virtual machines. Those VMs run on shared hardware. You […]
MFA Challenges and What to Look for in a Solution
In spirit of National Cyber Security Awareness Month, I wanted to briefly touch on points on MFA challenges that I’ve seen and come across and what to look for when you search for an MFA solution for your organization. First, be sure to watch my video blog to learn about what Multi-Factor Authentication is: In […]