Introduction If you’re sending instant messages at work, chances are you’re using Slack, the business-oriented analog of WhatsApp or Discord.…
Introduction Passwords should be secret, so why do so many people wind up using the same popular passwords? The truth…
Views and opinions published in this article are intended to foster productive thought and discussion around challenges in the cybersecurity…
Introduction If you work in security or are just interested in the general area of cybersecurity you will no doubt…
Introduction I am a staunch advocate of the consideration of human behavior in cybersecurity threat mitigation. The discipline of behavioral…
Introduction In today’s highly connected world, new cyberthreats and risks emerge seemingly every hour, around the clock. Whether it is…
Many Android apps contain hidden secrets When many people think about malware and other malicious or suspicious software, they focus…
Introduction Human beings have many things in common and we all live in one world, together. However, when it comes…
The COVID-19 pandemic has brought much of the world to its knees and sent ripples across all regions and industries.…
Virtual learning is an experience many teachers, parents and students have never previously planned for, and it?s creating cybersecurity risks.…