Similar Posts
Dark Patterns and the Law
Dark patterns are techniques that web site operators, typically, use to make it more difficult to choose one option than another. For example, try to close your Amazon account or your Facebook account. It used to be that you had to call Amazon and they would try and talk you out of it. Now you…
DoD CMMC Update for July 2023
CMMC or the Cybersecurity Maturity Model Certification passed a huge milestone this week when the Pentagon handed of the proposed rule to the Office of Management and Budget. After they approve the package, it gets published in the Federal Register for comment and implementation. Learn more about the remaining steps below.
The Risk of BYOD – Non-Managed Devices
Many companies allow, encourage and/or require employees to use personally owned devices. While it seems that, at least in the short term, this is a money saving and morale boosting move, in the long term, it may be an existential threat to the company. In this post we are going to use one company who…
CMMC News Update for October 2023
CMMC is definitely a work in progress. However, like all works in progress, there is progress being made. Here is the update for October.
Old Attacks Never Die – USB Malware Spreader
In this case, it wasn’t the well known “candy drop” attack but rather an accidental USB attack. Still infected an entire hospital. This one is attributed to China. Learn more below.
A Secure Replacement for Passwords
Passkeys will ultimately replace passwords. How soon is unclear because 2 billion websites need to be upgraded to support it and the vendors still have some kinks to work out. But it will happen and you need to learn about it and start playing with it. Learn more here: