Similar Posts
Why Dark Web Monitoring Is Critical
ByadminThe dark web is where most of the content is illegal and most of the traffic is about how to do illegal deeds. It is also where, for example, credentials to the Los Angeles School District network were available for sale prior to the ransomware attack on the district’s network earlier this month. Likely the…
- Compliance | Legal | User tips
Dark Patterns and the Law
ByadminDark patterns are techniques that web site operators, typically, use to make it more difficult to choose one option than another. For example, try to close your Amazon account or your Facebook account. It used to be that you had to call Amazon and they would try and talk you out of it. Now you…
Why Don’t You Use a Password Manager?
ByadminI came across a recent survey that said that the vast majority of companies still don’t provide centrally managed password managers or require that they be used. Learn why this is a problem and what you should do about it. Audio Video
Security by Design – A Great Example
ByadminRecently the communications technology firm Twillio was hacked and a number of their customer’s accounts were compromised. Among those compromised was the account of the secure messaging app Signal. While this is not good, Signal spent a lot of effort baking in security by design. Learn about what they did and why those efforts towards…
- CMMC | Compliance | DIB | DoD | IT Infrastructure | Legal | Privacy | Security News Update | User tips
Security News Update for April 20, 2025
ByadminSecurity News Update for April 20, 2025 This week’s news includes:
Dark Patterns
ByadminEver try to cancel a subscription online? Or even figure out when the subscription is due to be renewed? That difficulty is intentional and is now against the law in many states and countries. If you operate an online presence, it is important for you to understand what you are allowed to do and what…