NICE Framework: “Oversee and Govern” Challenges
This is the fourth of six articles in our series from Learning Tree instructor Aaron Kraus on the NICE Cybersecurity framework and common challenges many organizations face when trying to maintain vital cybersecurity skills and resources. To further your journey, read the rest of the blog series and learn more about Aaron Kraus here. Typical […]
More Bad Password Advice and More Good Password Advice
As I was writing this, Conan the Sysadmin tweeted about passwords and the need to use secure ones. His message was simple: “Passwords and secret signs are crucial #cybersecurity defenses. Craft good ones, and use them well.” This is excellent advice and the gist of what I have shared on this blog in the past. […]
Voice Assistants at Work: Can You Trust Them Not To Eavesdrop?
Amazon Alexa, Google Assistant and other digital voice assistants are rapidly moving from the home to the workplace. Along with the many potential benefits, there are concerns to consider. The idea of asking a voice assistant to set reminders, answer questions, and remember ideas is compelling. I can see using them in meetings and training […]
Mozilla To End ftp Support. What Are the Alternatives?
In March of this year, Mozilla followed in the steps of Google and announced the upcoming end to support for the ftp protocol in its browser. That is a very good thing! The ftp URI is the mechanism for browsers to use FTP (the File Transfer Protocol) to send and receive data from servers supporting […]
New Concerns About Uses of Facial Recognition
Facial recognition and other biometric technologies have great potential to assist in catching criminals, finding missing people, and in other law enforcement activities. I wrote here earlier about facial recognition and some of the associated caveats. Gizmodo recently had an article about 95%+ failure rate of facial recognition technology in Detroit. Not only is Boston […]