Similar Posts
DoD’s New Instruction on Labelling Controlled Technical Information
Most defense contractors have been complaining about the lack of specificity of how to protect controlled technical information or CTI. DoD has just released instructions clarifying the rules around protecting CTI. Learn more here.
Using Voice to Authenticate You is Risky
The CEO of OpenAI is echoing what I have been saying for years and that is that using your voice to authenticate you, for example for access to your bank account, is risky and that shortly any OpenAI customer will be able to spoof that, maybe for $20 a month. Learn more at the links.
Cryptocurrency is Ripe for Cyberattacks
Cryptocurrency is basically a very sophisticated IT infrastructure. One that is not regulated very much and one which can have devastating financial impact to people if it is compromised. And it is being compromised daily. Don’t bring a spoon to a fork fight – learn what some of the risks are so you can better…
Security Hanging by a PIN
The most important part of your digital security is protected, typically, by a 4 digit PIN, assuming it is protected at all. Learn what this resource is and why it is at risk. audio video
Security News Update for January 19, 2025
This week’s news includes:
Google Adds Android Privacy Feature
We all know that the big platforms track absolutely everything that we do. Now Google has added a feature to Android to reduce that tracking but I dare you to find it. The feature is not a magic fix but still a good tool. If you want to reduce Google’s tracking of you, you should…