Eric Jacksch
How Cloudflare stopped the bleeding
Tavis Ormandy, a respected security researcher with Google’s Project Zero, discovered the leak while analyzing Google search results. Ormandy wrote:…
Aegis Secure Key 3z – affordable and effective
The 3z is smaller, less expensive, and available in 8, 16, 32, and 64 GB capacities. As marketing manager Walter…
Practical password policy
Despite their weaknesses, passwords remain a dominant authentication mechanism, and the reason is simple: They are low cost and convenient….
Make the best email service decision
Free email accounts are provided by Internet Service Providers (ISPs), Google, Microsoft, Yahoo, and a numerous smaller providers. Since the…
Digital data beyond death
A generation ago, photos were kept in an album or slide carousel, and important personal information was on paper. Today,…
Got data?
Organizations hold an average of 569 per cent more data than two years ago, and are increasingly aware of its…
Farewell to the era of tolerating security negligence
According to the Google Security Blog, Chrome version 56, expected to be released around January 31, 2017, will warn users…
Start taking logging seriously
A recent experience with OpenVPN Access Server (AS) serves as a good example. OpenVPN AS is a popular commercial VPN…
Your New Year’s resolution
Information classification is a cornerstone of security. If employees are unable to easily determine the sensitivity of information, it is…
The insanity will continue in 2017
Cybercrime has become big business. An August 2016 Osterman research survey revealed that 39 per cent of respondent organizations were…
Reviews
SAMSUNG GALAXY S8 PLUS
The Samsung Galaxy S8 Plus is a beautifully crafted smartphone with nearly no bezel, curvaceous in design and reflects a…
How to: Connect to Exchange Online Using Multi-Factor Authentication
Using PowerShell to manage your Microsoft cloud services like Exchange Online and using multi-factor authentication (MFA) separately is awesome. Using…
Stay connected