If you really want to change the way people behave, the core issue isn’t how to write this email. To be successful, you’ll need to create a long-term, multi-channel approach…
Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss why the FTC tends to setting their cybersecurity cases instead of going to trial.
Length. Here’s a simple example. Which of these passwords is more attack-resistant? &^567*=M barbell-farther-grocery-sans-bluster-voyageur It’s the second one. Why? Because the typical approach to compromising a password requires brute force:…
I’m going to answer this question with a question: Did you know there are at least five high-profile cyber battles that have already happened that you can study? Stuxnet –…
Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, discuss how cyber-attackers are abusing the trusted relationship between IT service providers and their customers.
This question was recently asked by Mohammad on Quora. Here’s how I encouraged him to set himself apart in a new career in Cyber Security. There’s one practice that I’ve…
WPA3 delivers several security improvements. Here’s a big one: When you connect to an open Wi-Fi network, the traffic between your device and the Wi-Fi access point will be encrypted,…