Blog
Big companies spend millions of dollars guarding against data breaches—and sometimes they still come up short.
So how can small businesses prevent data breaches? Can it even be done? Fortunately, the answer is yes—and there are a number of simple, cost-effective things smaller organizations can do to minimize their risk and keep their customers safe.
Several of the insights in this piece came from our conversation data breach expert Troy Hunt, creator of the “Have I Been Pwned” data breach aggregation service. If you’d like to learn even more about data breaches …
October 16, 2019 •
6 min read
Blog
Troy Hunt is a Microsoft Regional Director and Microsoft Most Valuable Professional for Developer Security. He is the creator of Have I Been Pwned (HIBP), a free service that aggregates data breaches and lets people check if their accounts have been compromised. He is also a prolific speaker and educator, giving talks and organizing workshops around the world.
We caught up with Troy to talk about how both businesses and individuals can protect themselves from data breaches—and ask him about the future of information security and his …
October 16, 2019 •
15 min read
Blog
Everyone loves a Mac. They’re famously easy to use. Many people find themselves more productive on Macs. And let’s face it—they definitely have a “cool” factor that PCs can’t match.
October 15, 2019 •
6 min read
Security News
On this Checklist, we’ll take a look at the latest version of macOS. We’ll revisit two-factor authentication by way of a somewhat disappointing story involving Twitter. And we’ll round out the show with news of yet another data breach.
October 10, 2019 •
8 min read
Security News
We’ve talked quite a bit about jailbreaks in the past couple of months, from Apple’s accidental reintroduction of an old iOS jailbreak to one developer’s attempt to create an app marketplace for unapproved iOS software.
But recently, news has surfaced of a new jailbreak for iOS devices that could be bigger than all of these: checkm8.
Discovered by a security researcher who goes by the handle axi0mX, checkm8 (which is pronounced “checkmate”) is an unpatchable exploit for millions of devices running on iOS, including most iPhones and iPads.
In this article, we’ll tell …
October 10, 2019 •
5 min read
Blog
Michael Hartl is an award-winning educator and passionate advocate for technical literacy. He is the author of numerous books on programming, including the Ruby on Rails Tutorial, an introduction to web development which has helped people all around the world learn to code. Michael is also the founder of Learn Enough, an education company devoted to empowering people through the teaching of fundamental technical skills.
We recently spoke with Michael Hartl about the meaning of “technical sophistication”, the importance of technical education for cybersecurity, and more.
Thank …
October 9, 2019 •
7 min read
macOS
It’s official: macOS 10.15 Catalina has now been released to the public.
The latest Mac OS has a number of new features, including several key enhancements to security and privacy. But Apple’s release notes can sometimes be a bit heavy on jargon, leading users to wonder what the latest, greatest macOS updates actually mean!
In this article, we’ll take you on a tour of Catalina’s security and privacy features, explaining their significance and letting you know how they keep you safe.
article span.backnum { font-family:”Open Sans”, sans-serif; font-size: 10rem; opacity: 0.3; line-height: 1; …
October 9, 2019 •
8 min read
Security News
On this edition of The Checklist: The DoorDash data breach, Considering risks around AltStore, And the security side of recent Apple updates.
October 4, 2019 •
11 min read
Blog
Identity theft can upend your life. It requires a tremendous amount of time and effort to undo the damage—and the aftereffects can be felt for months or even years.
October 2, 2019 •
8 min read
Security News
On this edition of The Checklist: A third-party keyboard warning from Apple, How much is too much consumer protection?, and Apple Watch privacy in an always on world.
September 26, 2019 •
6 min read
Security News
On this edition of The Checklist: iOS 13’s built-in Cycle Tracker, Privacy and security in Apple Arcade, and Facebook location follow-up.
September 19, 2019 •
8 min read
Blog
If you’re trying to understand how cybersecurity works in an enterprise setting, you’re bound to come across terms like “red team”, “blue team”, and “purple team”.
The terms have their origins in the war games used by militaries to assess and improve their readiness. But what do these color-coded teams mean in the context of cybersecurity? What does each of them do, and how are they different from one another?
That’s what we’ll cover in this guide to different roles in cybersecurity testing and improvement.
Red team
Red teams, in cybersecurity, assume the role …
September 19, 2019 •
5 min read