Security News
Late last week, the US Customs and Border Protection agency released an update to its Directive governing Border Searches of Electronic Devices. According to the new directive, which supersedes...
Some Experts Question Whether a Voluntary Approach Is Strong EnoughA new House bill proposes that federal regulators work with healthcare providers and insurers as well as technology firms to...
Instituting a vulnerability disclosure program (aka bug bounty program) that won’t blow up in the organization’s face can be a daunting task. Some will prefer to enlist outside experts to advise...
NIST's latest password guidelines focus less on length and complexity of secrets and more on other measures such as 2FA, throttling, and blacklists.
Lately, I have been collecting IoT security and privacy guidelines. Here's everything I've found: "Internet of Things (IoT) Broadband Internet Technical Advisory Group, Broadband Internet...
Cyber bullying, virtual mobbing, doxxing, cyber stalking and harassment, revenge pornography – these are just some of the behaviors that the Internet and social media have enabled. Legislation...