Networks that run with users as local administrators have no way to enforce policies on their organization's computers. In this post, I show how and why.
With BYOD, companies are more than ever keen on protecting their data. MDM tools, like Google Apps, do more than that; they invade your privacy.
A CPU predicts you will walk into a bar, you do not. Your credit card has been stolen. The drinks are 30% more expensive. (Oh, and the bartender was insider trading)
Public CDNs are awesome; they are fast and free, but it means that third parties have control of stuff that run on your site. What if the CDN is compromised?
What is HSTS? How does it protect your web host from SSL Stripping Man In The Middle attacks? How can you implement it?
DNSSEC is a suite of specifications for securing DNS. How do you enable your Windows DNS Server to Validate DNSSEC?
How can Alice and Bob agree on a secret, without having any prior knowledge of each other, over the Internet and with Eve listening in on the conversation?
Petya is a new variant of ransomware, first seen in March 2016 that encrypts your entire hard drive. Learn how to reverse it and get your data back.
Encrypting Ransomware is one of the biggest threats in 2016, both for personal computers, your corporate IT and enterprise infrastructure. How can you mitigate and minimize your attack vectors?
March 31st is World Backup Day. Even though, everyday should be World Backup day, today we discuss some important backing up techniques and tips to hopefully raise some awareness