Fake Image Detection

Fake Image Detection

| | Fake Image Detection
Introduction This is a frying pan.   This is a frying pan with a badly drawn pair of eggs in it.   Any questions? The phrase “X has been Photoshopped” has become shorthand for “this piece of media has been edited in some manner.” Sometimes it’s as simple as adding ... Read More

Endpoint Hardening (best practices)

Introduction Endpoint hardening: If you were to tell the average person that you were going to be performing this task for your organization, they’d probably ask if you were a blacksmith.... Go on to the site to read the full article ... Read More
You Won’t Believe What Obama Says In This Video! 😉

Deepfake

| | Deep Fake
Introduction “Deepfake” isn’t a new type of beauty cream, an underwater virtual tour or even a sternly worded insult. It is in fact, the culmination of decades worth of audio and video editing... Go on to the site to read the full article ... Read More

Mobile Device Management

| | Mobile Device Management
Introduction “Hey Buddy, can you make it so my phone can get work email please?”  “Oh sure, no problem.”  “Thanks.  Also I’ll need my laptop, tablet, smartwatch,... Go on to the site to read the full article ... Read More

52 NICE Cybersecurity Workforce Framework work roles: What you need to know

Introduction In the US, Chinese restaurant menus usually have many combination plates available for lunch or dinner, each representing a particular grouping of ingredients in a specific ratio. These... Go on to the site to read the full article ... Read More

Data execution prevention (DEP) in Windows 10

Introduction Does this sound familiar? “Sorry, not on the list.” “Oh come on! I was just in there five minutes ago! I just need to go get my coat.” “Not on the... Go on to the site to read the full article ... Read More
How to use Windows 10 quick recovery options

How to use Windows 10 quick recovery options

Introduction In the days of Windows 10, everything is fine and happy and everything works all the time. OK, that may be just a tiny bit exaggerated. Like it or not, issues happen sometimes without... Go on to the site to read the full article ... Read More

How to use Disk Quotas in Windows 10

Introduction Let’s say for a moment that it’s been a big family dinner and you’ve got one massive pie left for dessert. You ask who wants pie, and four people each say they want... Go on to the site to read the full article ... Read More

New Cisco report: SMB security posture catches up to enterprise counterparts

| | General Security
Introduction Small-to-medium businesses (SMBs) have a lot of things to deal with. They have a huge number of responsibilities but not a lot of resources to do them with and even fewer people to... Go on to the site to read the full article ... Read More

How to configure Internet Options for Local Group Policy

Introduction Does this sound familiar? “Welcome to Monopoly!” “All right, now we’re going to go with auctions if you don’t buy.” “Why? That’s so... Go on to the site to read the full article ... Read More
Loading...

Secure Guardrails