Remove most-popular-data-insider-blogs-2020
article thumbnail

The Most Popular Data Insider Blogs of 2020

Digital Guardian

SOX compliance, preventing social engineering attacks, and data classification. In this blog, we count down the most read blogs of 2020.

article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

I've been directly involved in the discovery or disclosure of a heap of these and indeed, security is normally the thing I most commonly write about. I can't blame this on the teddy bears themselves, rather the fact that the MongoDB holding all the collected data was left publicly facing without a password.

IoT 358
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Rising volume of email fatigue opens doors for Cybercriminals

CyberSecurity Insiders

This blog was written by an independent guest blogger. In fact, one of the most worrying types of DAF for security professionals is email fatigue. In fact, one of the most worrying types of DAF for security professionals is email fatigue. Unfortunately, this is when we are the most vulnerable to hackers.

Phishing 124
article thumbnail

Thales joins Google’s 5G Mobile Edge Cloud initiative

CyberSecurity Insiders

In March 2020, Google Cloud unveiled its telecom operator strategy called Global Mobile Edge Cloud (GMEC), aimed at helping Communications Service Providers (CSPs) digitally transform and harness the full potential of 5G. Data analytics. Data protection. With 5G , more applications and data are moving closer to end customers.

Mobile 119
article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

Since 2020, chosen-prefix attacks against SHA-1 are feasible. The results of our analysis clearly show that, while the most popular websites have done a good job of migrating away from SHA-1 certificates, a significant portion of the Internet continues to rely on them,” said Walter Goulet, a cloud solutions product manager at Venafi, in 2017.

article thumbnail

3 reasons even Chromebook™ devices benefit from added security

Webroot

The respected technology blog TechRadar has even referred to 2021 as “the year of the Chromebook.”. Even strong security can’t prevent an account from being hacked if account credentials are stolen in a phishing attack, one of the most common causes of identity theft. But many types of malware aren’t immediately obvious.

article thumbnail

Owowa: the add-on that turns your OWA into a credential stealer and remote access panel

SecureList

While looking for potentially malicious implants that targeted Microsoft Exchange servers, we identified a suspicious binary that had been submitted to a multiscanner service in late 2020. The malicious module was most likely compiled between late 2020 and April 2021. Geography of Owowa targets.