USB: From bad to worse
Over the last two decades, the USB standard has dominated due to its versatility: keyboards, mice, scanners, storage devices, smart…
In the zone
Another component of corporate security strategy is to enable in-line security products capable of automated risk mitigation. While concerns about…
One hack away
Security breaches are damaging our economy, eroding our privacy, and pushing businesses toward bankruptcy. Attacks are increasingly sophisticated, targeted, and…
Email 3.0: The Next Generation
Email has four basic use cases: notifications, discussions, file transfer, and electronic filing. However, SMTP, POP3, and IMAP were not…
Privacy: Why Should I Care?
They say a week is a long time in politics; a year is certainly a long time in security. Every…
Bill C-13: Privacy Lost
Proponents of mass surveillance attempt to dismiss privacy concerns by emphasizing metadata collection, as if tracking the source and…
Cloudy with a chance of…
1) Where is their data being processed and stored?2) What laws and regulations apply? 3) Who has access to the…
Look beyond BYOD
Today, the computing landscape has evolved considerably. We frequently share sensitive information with subcontractors and business partners who use their…
Rapid cybersecurity risk assessments: A primer
Security risk assessments allow us to make reasoned decisions about security budget allocations. We’re not always right, but that shouldn’t…
Send me a postcard?
For those who haven’t been following the case, Lavabit was served with a so-called “pen register” order in June requiring…
Reviews
SAMSUNG GALAXY S8 PLUS
The Samsung Galaxy S8 Plus is a beautifully crafted smartphone with nearly no bezel, curvaceous in design and reflects a…
How to: Connect to Exchange Online Using Multi-Factor Authentication
Using PowerShell to manage your Microsoft cloud services like Exchange Online and using multi-factor authentication (MFA) separately is awesome. Using…
Stay connected