Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


NIST proposes barring some of the most nonsensical password rules

Proposed guidelines aim to inject badly needed common sense into password hygiene.

Last week, NIST released its second public draft of SP 800-63-4, the latest version of its Digital Identity Guidelines. ...

Continue Reading →
0

The Role of End-to-End Encryption in Securing Virtual Meetings

By Aaron Smith

Criminals will eventually find vulnerabilities and exploit them. Unsecure virtual meetings are no exception

Companies conduct hundreds of thousands of virtual meetings every day. Many of these meetings include the exchanging of sensitive information that could damage the company if it fell into the wrong hands. Cybercriminals are aware of this and will do everything in their power to access it. Luckily, video conferencing providers are fighting back by equipping their software with end-to-end encryption

Here’s how it works.

From Sender ...

Continue Reading →
0

The Network Security Key Isn’t Correct Please Try Again

By Ace Baker

Network security is an important component of modern technology infrastructure, and its effectiveness depends on the accuracy of the key assigned to it. An incorrect key can bring a variety of headaches for systems administrators, ranging from network downtime to data loss. This article will discuss what may be causing the issue when a user is faced with the message “The network security key isn’t correct; please try again” and how to fix it.

Why ...

Continue Reading →
0

Can A VPN Protect Me From Hackers?

By Ace Baker

Yes, a VPN can protect you from hackers by providing an extra layer of security and encryption to your internet connection. When you connect to a VPN server, your data is encrypted and tunneled through a secure server, making it much harder for hackers to intercept and decipher your sensitive information.

With the use of strong encryption protocols, a VPN ensures that your online activities, including browsing, sending emails, and accessing sensitive data, remain private and protected from potential ...

Continue Reading →
0
Page 1 of 12 12345...»