A recent investigation by the Office of the Privacy Commissioner of Canada into Home Depot of Canada Inc. has found that Home Depot failed to obtain customer consent before sharing personal data with Meta.
Privacy discussions often revolve around the use and abuse of personal information by governments and corporations. While global surveillance is a serious concern, and some corporations abuse the information entrusted to them, the fact remains that most Internet users happily hand over their private information and allow companies to use it in exchange for “free” services.
In today’s episode of SecurityGuy, I discussed Mastodon and the fediverse with Jerry Bell, a Chief Information Security Officer and the administrator of infosec.exchange.
In today’s episode of SecurityGuy, I speak with my friend and colleague, the co-founder and CEO of Saf.ai, Ahmed Masud about saf.ai’s flagship product Resiliate, which applies cutting-edge AI to protect data against unauthorized access and changes, data corruption, and data exfiltration. Among other things, Resiliate provides cost-effective defence and rapid recovery from ransomware...
While speaking at the 2004 RSA Conference, Bill Gates predicted the demise of passwords saying, “they just don’t meet the challenge for anything you really want to secure.” In 2011, IBM predicted that within five years, “you will never need a password again.” The death of passwords has been predicted by many people. We’re still waiting…
Many businesses make serious mistakes that place their data at unnecessary risk. These mistakes often stem from a fundamental misunderstanding of storage technologies. Redundant Array of Independent Disks, more commonly referred to by the acronym RAID, is an approach to data storage virtualization that combines multiple physical disk drives into one or more logical storage volumes. Depending on...
Over the past few days, we’ve learned that the LastPass breach disclosed in August 2022 was much worse than previously reported. Here’s my take on the situation, what you need to know, and what to do about it.
In 1905, George Santayana wrote, “Those who cannot remember the past are condemned to repeat it.” Variations of his words have been attributed to several famous people, but as far as some software developers are concerned, the underlying message has fallen on deaf ears.
When I teach security architecture, I’m often asked if the choice of programming language matters. From a security perspective, the answer is yes. But it’s a bit more complicated than that.
Today I’m going to talk about a growing problem in cybersecurity and IT in general: alert fatigue.