Similar Posts
Is Blockchain Secure
The value of Bitcoin and other virtual currencies seems to vary a bit. Three months ago, Bitcoin was trading at about $47,000 and today it is trading at about $21,000. But, while that could be a big problem for some speculators, that is not what I am concerned about. The core behind all of the…
The Risk-Reward Tradeoffs of GPT AI
Everyone is using AI and tools like ChatGPT have become super popular virtually overnight. But have you considered the risks associated with using these tools, have you created policies for your employees, do you understand how your vendors may be adding risk to your business and are you managing that risk? Learn more here.
Lessons to Learn from the MGM-Caesars Breach
The breaches of both MGM and Caesars were not high tech; they were pure social engineering attacks. That means that you can harden your company and your information likely for very little money. While this is early in the game, there are some easy lessons to learn here. Here are some key takeaways from the…
Why Don’t You Use a Password Manager?
I came across a recent survey that said that the vast majority of companies still don’t provide centrally managed password managers or require that they be used. Learn why this is a problem and what you should do about it. Audio Video
Dark Patterns and the Law
Dark patterns are techniques that web site operators, typically, use to make it more difficult to choose one option than another. For example, try to close your Amazon account or your Facebook account. It used to be that you had to call Amazon and they would try and talk you out of it. Now you…
Security of Network Devices with Public Management Interfaces
CISA, the Cybersecurity and Infrastructure Security Agency released a directive, which is binding on federal civilian executive branch agencies, that addresses the security of network and operational technology (OT, IoT) devices which can be managed from the public Internet. Learn what CISA and we are recommending below.