6 Tips to Help Protect and Improve Your Child’s Online Reputation

Not the better choice. Take it down, please. That’s the short, efficient text message I’ve sent more times than I can count over the years while monitoring and coaching my kids’ online content...

Biggest DDoS attack in history takes GitHub offline

The software development platform GitHub has suffered what is apparently the biggest distributed denial-of-service (DDoS) attack on...

Cisco Threat Grid Supports FLETC’s New Cyber Incident Response and Analysis Course

I received my first computer forensic training at the Federal Law Enforcement Training Center’s (FLETC) Seized Computer Evidence Recovery Specialist (SCERS) course in Glynco, GA; while a Special Agent for the US Army...

How to Talk to Clients About Insider Threats

So your clients are concerned about cyber security, they have a firewall and have invested in security technology to keep external hackers out of their systems. Despite these investments cyber incidents keep happening,...

Keeping on top of ICS-focused hacking groups, defenses

How many hacking groups are focusing on ICS systems? Dragos security researchers say at least five were active in 2017. “While only one has demonstrated an apparent capability to impact...

Troy Hunt: Weekly Update 76

Massive, massive week! I'm not trying to make these videos longer (and the next two while I'm overseas will definitely be shorter), but yeah, this week was a biggie. Pwned Passwords dominated throughout,...

Make Yourself Invisible to Hackers: the Human Firewall –

Modern medicine is overwhelmingly reactive rather than proactive. How...

Pitfalls of identity access management

TrackingImage by ThinkstockIt is easy to overlook identity access management as static infrastructure in the background, and that's the chief problem: Too few organizations treat IAM as the crucial, secure connective tissue between...

LATEST NEWS

MUST READ