Blockchain – not just for cryptocurrencies, and not guaranteed secure

Posted by:

Blockchain continues to be widely promoted as a panacea set to revolutionize the internet, cut out all manner of middle-men and lead us to a new, simpler, safer world.

In the minds of most everyday folks (at least, those who are aware of it at all), it remains closely tied to Bitcoin and other cryptocurrencies, while even those who have heard about its wider applications tend to consider it super-secure by default.

But both these assumptions are on very shaky ground: it ...

Read More →
0

Yes, the passwords users choose *really* matters

Posted by:

Earlier this month, we celebrated that little-known tribute day known as World Password Day.

Responsible security organizations should use this opportunity to share best practice advice to help people understand just how darn easy it is for fraudsters to cause havoc if they can access privileged accounts authorized to change, edit and delete files, settings, apps or data.

Sadly, it seems that it is also a day where marketing people, who might be less au fait with cybersecurity, ...

Read More →
0

Vulnerability Assessment, Penetration Testing and Red Teams Explained

Posted by:

Confused about vulnerability testing and penetration tests and Red teams? I’m not surprised one bit.

These days, a growing number of information security experts use these terms interchangeably, as though they refer to the same thing. Whether it is due to apathy or a clear lack of understanding of the differences between these activities, security service providers are only confusing the matter by not informing their customers of what they get with each of these services. ...

Read More →
0
})
SEC Cybersecurity Exams