Tags » CyberSecurity

Stay safe: Massive database of stolen passwords surfaces

Every few months, it seems, a big trove of usernames and passwords surfaces somewhere.

This week it was uncovered by Bob Diachenko of Kromtech Security Research Center. 309 more words


Gestor de contraseñas: ¿herramienta segura o vulnerable?

Seamos realistas: las contraseñas no son sólo un incordio, encima ni siquiera logran ser seguras. El ciudadano medio tiene docenas de combinaciones de nombre de usuario y contraseña que debe recordar y muchos llegan a acumular cientos de combinaciones que no utilizan. 555 more words


Logiciels de gestion de mot de passe : outil sécurisé ou point faible ?

Soyons honnêtes: au-delà du fait que se souvenir d’eux est parfois un casse-tête, les mots de passe ne sont pas en soi les verrous les plus efficaces pour protéger nos données. 781 more words


Inklings of what you'll be hearing at my readings

Hello again.

If you’re in the New York/Long Island area over the summer, here are the locations where I’ll be reading from ATONE FOR THE IVORY CLOUD: 947 more words


Leaked U.S. cybersecurity order focuses on workforce development

The latest draft of the Trump administration’s cybersecurity executive order focuses on modernizing federal IT systems and holding departmental heads responsible for maintaining adequate security. 382 more words


ISO 27001 certification: Is it worth the trouble?

What should an organization do to protect its information?

Many organizations turn to ISO 27001 certification. The ISO 27001 standard offers a well-known framework to implement industry best practices in areas such as security incident management and physical security. 1,009 more words

Business Processes

GameStop, Scottrade suffer data breaches

A duo of recent data breaches — one hitting a stock trading brokerage and another a videogame retailer — shows that more gains are needed to protect customer data, even with all of the progress made over the last 10 years. 486 more words