How to lessen the workload on the CISO and their team
What tasks needlessly overload infosec experts, and how to break the curse of overtime.
Economics. Eschatology. Infosec.
82 articles
What tasks needlessly overload infosec experts, and how to break the curse of overtime.
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.
You’re spending way more on subscriptions than you expect. How to take control of them and save money?
Offboarded employees often retain access to work information. What are the risks, and how to deal with them?
Detailed tips for those who want to make money from streaming without feeding the trolls.
What caused a mass vulnerability in VPN clients, and how to keep them working.
What settings do you need to clear before getting rid of a gadget?
Legacy systems continue to toil away in embedded solutions, medical equipment, and precision instruments. How can the respective security risks be mitigated?
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
How to secure chats on your phone, and why encryption alone is not enough
What security aspects should be top-of-mind when implementing important changes in corporate IT infrastructure?
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
Low-code apps lower IT costs, but boost information security risks. How to mitigate them?
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
Get all the benefits of a VPN — not just on your phone, but on your home computer, game console and smart TV too. The easiest way is to enable the VPN feature on your home router.
Proper account security not only reduces the number of cyberattacks on companies — it brings financial benefits too. What needs to be done to reap them?
Now anyone can sign device firmware with MSI private keys. This represents a long-term persistent risk to be considered by all users.
Сloud technologies differ in terms of both costs and risks. What cloud type should you choose, and how should you begin your migration?
Website names in the ZIP and MOV domains are indistinguishable from file names. How will this affect IT systems, and what will threat actors do?