CyberSecurity Musings Data Security In The Cloud: Part 2 [Published in iPswitch] Vulnerabilities in cloud-sharing services stem from the usage of multiple cloud services because of which users need to keep adapting Data Security in the Cloud: Part 1 [Published in iPswitch] The adoption of public cloud computing makes user data less secure. And it's not for the reasons most in IT Why do we still teach our children ABC? [Published in Medium] “Why do you teach me ABC?” My precocious preschooler pointed to the virtual QWERTY keyboard on the tablet: “Why not COVID-19's Lessons About Social Engineering [Published in Dark Reading] Unless we do something proactively, social engineering's impact is expected to keep getting worse as people's reliance on technology increases Improving Everyone’s Ability to Work from Home After the Pandemic [Published in IPSwitch] Two out of three Americans with jobs are already working from home because of the pandemic. Many will have to Stopping the Dark Triad from impacting our response to COVID-19 [Published in IPSwitch] Last week, New York City Mayor Bill de Blasio warned residents of a widespread Twitter and text-message circulated misinformation campaign It's 2020: Do we need more cyber hygiene? [Published in InfoSecurity Magazine] This month we learned that a US maritime base had to be taken offline for more than 30 hours because How much cyber hygiene do you need? [Published in Medium] Cyber hygiene: the term that is evoked whenever there is a threat to our infrastructure, a ransomware attack, or any data breach. It The troubling implications of weaponizing the Internet [Published in Washington Post] Cyberwarfare suddenly went public late last month. Multiple media outlets reported that President Trump had authorized U.S. Cyber Command to Why smartphones are more susceptible to social attacks [Published in 2019 Verizon DBIR] Research points to users being significantly more susceptible to social attacks they receive on mobile devices. This is the case « Previous 1 2 3 4 5 Next »