Biometric Auth Defeats, Internet of Things Insecurity, and Recovery Time Objectives
Biometric authentication tokens are not good security and can be beaten
Amazon Echo, Alexa, Echo Spot are really spy devices
Restoring backups was going to take too long, so hospitals paid ransom
MP3 - IoT Devices, Biometric Authentication, and Recovery Time Objectives
MP3 - Protecting Your Privacy
MP3 - Network Security Strategy and Trustico Debacle
10/6/2017, 10/20/2017
Cybersecurity Compliance and Enforcement
What is needed to actually achieve "good enough" cybersecurity practices in organizations?
An update on unconstitutional Stingray use.
RPC over HTTP ceases to be supported for Office 365 on 10/31/2017
MP3 - Cybersecurity Compliance and Enforcement
MP3 - Cybersecurity Updates
12/14/2018, 1/5/2019
The Failure of the One Identity Concept
MP3 - The Failure of the One Identity Concept
MP3 - Privileged Identity Management
9/2/2016
HTML-Based Email Signatures, Facebook Creepiness, SSA MFA
Embedded graphics in email signatures are problematic. Creepiness about Facebook. And Social Security Administration MFA backtrack
MP3 - HTML-Based Email Signatures, Facebook Creepiness, SSA MFA
5/3/2019
Lessons from recent security issues
MP3 - Lessons from recent security issues
9/30/2016
Midyear Security Roundup - Part 1
Part 1 of the midyear security roundup. It is now easy to steal Windows credentials from a computer via USB even if the logon screen is locked. An important router security website you should check out. How IoT devices being improperly secured and segmented creates major issues for you.
MP3 - 2016 Midyear Security Roundup - Part 1
9/30/2016
Midyear Security Roundup - Part 2
Part 2 of the midyear security roundup. Changes to how Microsoft Updates are being delivered. Why you should use OEM hardware. Most popular breach methods. Business email compromise scams.
MP3 - 2016 Midyear Security Roundup - Part 2
11/17/2018
SIM Jacking, TruthFinder, Why SMS-based MFA is very risky
MP3 - SIM Jacking, Truthfinder, SMS MFA Risks
10/5/2013
Finally, the solution to your needs to exercise and work on computers at the same time.
LifeSpan TR1200-DT5
Setup your SSA account before the criminals do
The failure of KBA - knowledge-based authentication
8/18/2016
Website Security, Strategy, and Developer Selection
All about how to secure a website, having a good website security strategy, and how to select developers
MP3 - Website Security, Strategy, and Developer Selection
9/16/2016
In the Cloud, the Credential is Often the Perimeter
When you use cloud hosted services, usually, the credential is the perimeter. In this case, MFA is absolutely required, and you need to use a system that also alerts you to authentications, password changes, and any other changes to your account. Using a system with anything less is just unacceptable.
MP3 - When the Credential is the Perimeter
6/20/2014
YubiKey with Password Safe fully explained
The accompanying article can be found here.
YubiKey with Password Safe
Author: Felicia King
Download
Go here to listen to the accompanying Breakfast Bytes podcast on YubiKey with Password Safe. It's got a lot more info and is not a duplication of article content.
This article is all about how to enhance an already great password management tool with two-factor authentication.
| | | | | | | | | |