Four out of five employees admitted to engaging in some risky behaviors while at work, even though they were aware of cyber-security dangers, according to a new global survey.Full Article
In February of this year, I published an article in SC Magazine called The Security Model is Broken. Because every organization is susceptible to a breach, we must rethink our security models and implement better preventive measures.Full Article
Thieves used an online service provided by the IRS to gain access to information from more than 100,000 taxpayers, the agency said Tuesday. The information included tax returns and other tax information on file with the IRS.Full Article
In the world of vulnerability management you really can't get away from using the king of all port scanners, Nmap. Nmap is one of the those tools that you need to have and be familiar with. It's such a powerful utility I don't know how I could do my job ...
Your privacy is important, even if our concern for it is often misplaced. Nowhere is it more misplaced than the tech we use at work. When you use office computers, phones, or other gear, you shouldn’t expect privacy. And yet, so many still do.Full Article