The Most Popular Data Insider Blogs of 2020
Digital Guardian
JANUARY 25, 2021
SOX compliance, preventing social engineering attacks, and data classification. In this blog, we count down the most read blogs of 2020.
Digital Guardian
JANUARY 25, 2021
SOX compliance, preventing social engineering attacks, and data classification. In this blog, we count down the most read blogs of 2020.
Troy Hunt
NOVEMBER 25, 2020
I've been directly involved in the discovery or disclosure of a heap of these and indeed, security is normally the thing I most commonly write about. I can't blame this on the teddy bears themselves, rather the fact that the MongoDB holding all the collected data was left publicly facing without a password.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
CyberSecurity Insiders
NOVEMBER 29, 2021
This blog was written by an independent guest blogger. In fact, one of the most worrying types of DAF for security professionals is email fatigue. In fact, one of the most worrying types of DAF for security professionals is email fatigue. Unfortunately, this is when we are the most vulnerable to hackers.
CyberSecurity Insiders
FEBRUARY 12, 2021
In March 2020, Google Cloud unveiled its telecom operator strategy called Global Mobile Edge Cloud (GMEC), aimed at helping Communications Service Providers (CSPs) digitally transform and harness the full potential of 5G. Data analytics. Data protection. With 5G , more applications and data are moving closer to end customers.
Security Boulevard
JULY 21, 2022
Since 2020, chosen-prefix attacks against SHA-1 are feasible. The results of our analysis clearly show that, while the most popular websites have done a good job of migrating away from SHA-1 certificates, a significant portion of the Internet continues to rely on them,” said Walter Goulet, a cloud solutions product manager at Venafi, in 2017.
Webroot
OCTOBER 25, 2021
The respected technology blog TechRadar has even referred to 2021 as “the year of the Chromebook.”. Even strong security can’t prevent an account from being hacked if account credentials are stolen in a phishing attack, one of the most common causes of identity theft. But many types of malware aren’t immediately obvious.
SecureList
DECEMBER 14, 2021
While looking for potentially malicious implants that targeted Microsoft Exchange servers, we identified a suspicious binary that had been submitted to a multiscanner service in late 2020. The malicious module was most likely compiled between late 2020 and April 2021. Geography of Owowa targets.
Let's personalize your content