The Importance of IT Asset Disposal

Perhaps your company has purchased secondhand phones or computers, only to discover that the previous owners had left personal information on them.  Or perhaps you’ve heard of major corporations getting penalized millions of dollars for improperly disposing of their IT assets.
Or perhaps you’ve read frightening news reports of landfills stacked high with discarded devices in poor countries, ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


China’s New Data Policy and What It Means

China enacted the Personal Information Protection Law (PIPL) on August 21, 2021 as part of that country’s growing scrutiny of its high tech sector. This law goes into effect on November 1, 2021 and will impose a new set of obligations for data security, especially when combined China’s Data Protection Law. ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


LANtenna hack spies on your data from across the room!

Are your network cables acting as undercover wireless transmitters? What can you do if they are?


A few posts from Bruce Schneier


FBI Had the REvil Decryption Key

[2021.09.22] The Washington Post reports that the FBI had a decryption ...

Continue Reading →
0

Week 3: Why You Should Consider a Cyber Career

Cybersecurity is one of the hottest sectors today, with new threats and challenges emerging each day. And with that, there is a huge push being undertaken by both business and education sectors to attract individuals toward a degree and career in cyber. Interested in joining this exciting new workforce? Here are a few reasons why pursuing a degree ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Why open source software supply chain management is worse than you think

A Sonatype survey also found a 650% year-over-year increase in supply chain attacks aimed at upstream public repositories.


VMware patch bulletin warns: “This needs your immediate attention.”

“It is a matter of time before working exploits are available,” warns VMware.


Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Bruce Schneier Edition


Excellent Write-up of the SolarWinds Security Breach

[2021.08.30] Robert Chesney wrote up the Solar Winds story as a case study, and it’s a really good summary.

This one is a must read.


Surveillance of the Internet Backbone

[2021.08.25] Vice has an article about how ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


How safe is a quantum-safe virtual private network?

Verizon aims to find out by testing the technology, which is geared at enhancing encryption methods using session key exchange security mechanisms, the carrier said.


What’s going on with the ‘Great Resignation’?

By Steven J. Vaughan-NicholsComputerworld
You’d better work ...
Continue Reading →
0

Its A Software-Defined Virtualized World

One of the trends that I am seeing, at least as it applies to the curriculum used in most cybersecurity certifications, such as the CISSP, CASP+, and CySA+, is that technology is moving to a software-defined, virtualized everything.  The latest issue of the Internet Protocol Journal, Volume 24, Issue 2, July 2021 has an interesting article titled Network Functions Virtualization. Reading the article made me think back to the topics I’d been teaching about Software-Defined Networking, which involves splitting traditional router functions into the ...

Continue Reading →
0
Page 6 of 8 «...45678