NordPass released their annual report of commonly used passwords again.
Feature Image Attribution (Grok 3 beta)
Read More »Software security topics
NordPass released their annual report of commonly used passwords again.
Feature Image Attribution (Grok 3 beta)
Read More »Good password hygiene is part of any individual’s basic InfoSec. Whether at home or at work, it is imperative to manage your passwords / credentials to the many places we rely on each day.
Data is more and more valuable. Yet the passwords we use haven’t kept pace. So what are people to do? Why is the messaging around good password usage so mixed?
Read More »When was my server last rebooted? Who shutdown my machine? Read on to see how easy it is to find out using the Windows Server Event Logs.
Read More »Like water flowing downhill, attackers will take the path of least resistance to compromise a system. Old technology that doesn’t learn new tricks is a prime target.
The ACM published an article in the Communications of the ACM by Keith Kirkpatrick which delves into security issues with SCADA systems.
Read on about SCADA systems and the security implications of old technology.
Read More »More and more countries are considering various types of bans on encrypted communications. Germany is thinking about it. So is the UK. Australia is actively pursuing it too.
Read on to hear why encryption bans are a bad idea.
Read More »Many times when people think about security principles the one that jumps out to them is the principle of least privilege. However, there are other security principles to consider. Let’s look at 8 security principles laid out decades ago that are still relevant today.
Read More »The proliferation of online login accounts has made our lives easier and more convenient to gather information, pay bills, etc. However, it comes at a cost. Our password management hasn’t changed much – and that creates a vulnerability that can really hurt.
Read on to see the pros and cons of password management systems.
Read More »Using a VPN is critical for protecting yourself online and maintaining a level of privacy. It might sound technical and intimidating but it is as easy as checking email – and the benefits are significant.
Let’s discuss what you can do and why to stay safe online.
Read More »Recently there were two huge data breaches of two very large companies. Both organizations collected a ton of information about their clients. The breaches were both spectacular in scope. Furthermore, both were among the largest known data breaches.
I see a large contrast between the Marriott breach and the Equifax breach. The difference between the two massive breaches clearly demonstrates the importance of basic security methods.
Read More »Many years ago Microsoft published a list of the “10 immutable laws of security”. The page has since been removed; however, another version popped up with very slight changes.
Read on the see the security principles from decades ago which are still prevelant today.
Read More »