12 Cyber Security Tips to Stay #CyberAware All Year Long
nov 20,
2019
Holidays are coming up and there will undoubtedly be movie messages about keeping the holiday spirit alive not just for one month but the whole year through. Looking back, we just finished National Cyber Security Awareness Month and it’s worth asking: how do we focus on cyber security issues not just during the month of […]
Who Cares If Ten Million Passwords Were Disclosed?
nov 27,
2017
This past week (as I write this) security researcher Mark Burnett (who literally wrote the book on passwords) released ten million passwords gathered from security breaches. He went one step further and released the account names (without the domain part) of the associated email addresses. That’s a lot of passwords. Here’s why you should care. […]
Could a Hand-held EMP Device Threaten Cyber Security?
aug 9,
2017
The ability to disable computers, cars, or other machinery from a distance without being easily detected has fascinated me for a long time. Years ago I worked for defense cub-contractor founded by engineers who had worked on the Airborne LASER Laboratory (ALL). They successfully used a LASER on board an airplane to shoot down drones. […]
Biometrics — Can You Afford to Lose a Finger?
jul 12,
2017
Biometric authentication has been attracting a lot of attention recently. Every day you see people deftly swiping their thumbs over their phones to unlock them using fingerprint recognition. Iris scanning technology is being introduced to India’s national biometric ID system. It’s the largest such system in the world—with over a billion users—and is used to […]
authentication,
biometric authentication,
biometric security,
biometric technology,
biometrics,
cyber security,
facial recognition,
fingerprint recognition,
fingerprints,
iris scanning,
password
How to Instill Cyber Security Across the Organization
maj 4,
2017
”A chain is only as strong as its weakest link” ”What a cliché!”, you say. Well, it became a cliché for a reason. People keep saying that because it does describe many situations. It’s a useful way of thinking about the world. In cyber security, we have a crucial security chain with links forged from […]