Recent Posts

IT Asset Disposition (ITAD) is the Slow Motion Data Breach Nobody notices

Efforts to wall off sensitive corporate and government data from foreign adversaries have a gaping hole: IT asset disposition (ITAD), where vendors – many owned by Chinese firms – process discarded hardware and data with little oversight.

Episode 173: Iran’s Cyber Payback for Soleimani Killing may have a Long Fuse

As it weighs further response to the assassination of General Qasem Soleimani, Iran is almost certain to consider the use of cyber attacks. We talk with Levi Gundert at the firm Recorded Future about what cyber “payback” from Tehran might look like.

Eliminate the Password, Eliminate the Password Problem.

Weak, stolen or reused passwords are the root of 8 in 10 data breaches. Fixing the data breach problem means abandoning passwords for something more secure. But what does passwordless authentication even look like? Yaser Masoudnia, the Senior Director Product Management, Identity Access Management, at LogMeIn* takes us there.

Episode 172: Securing the Election Supply Chain

In this episode of the podcast (#172), Jennifer Bisceglie, the founder and CEO of Interos to talk about the links between America’s voting infrastructure and countries with a history of trying to subvert democracy.

Resolve to fix your Online Security Mess in 2020. Here’s how.

If you do nothing else in 2020, resolve to clean up the mess that is your online security. We give you some simple steps to level up your password and account security.