Why Zero-Trust in Video Conferencing is Crucial

Why Zero-Trust in Video Conferencing is Crucial

By now you’ve likely heard the term “zero-trust” and how it relates to cybersecurity. A few years ago, it was in more of a conceptual stage, two attached words floating about like ...
Security Boulevard
Android Virtual Device for a Mobile PenTest

How to configure Android (Virtual) for Mobile PenTest

This post is about setting up an Android Virtual Machine (AVD) for a mobile application penetration test ...

Workplace Surveillance, Apple and Google Contact Tracing Tech, Virtual Cybersecurity Conferences

In episode 119 for May 4th 2020: The use of thermal cameras and other technology to monitor the workplace for COVID-19, more details about Apple and Google’s contact tracing framework, and are ...

What’s the real value—and danger—of smart assistants?

Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they're dangerous, and other times downright hilarious. What's the real value in these devices? Categories: Security world Technology ...

Create a Team for Audit Analytics? Part 3

In the previous post, Create a Team for Audit Analytics? Part 2, I explored the pros and cons of expecting all auditors to develop a level of data and analytic proficiency. These ...