Efforts to wall off sensitive corporate and government data from foreign adversaries have a gaping hole: IT asset disposition (ITAD), where vendors – many owned by Chinese firms – process discarded hardware and data with little oversight.
Recent Posts
Episode 173: Iran’s Cyber Payback for Soleimani Killing may have a Long Fuse
As it weighs further response to the assassination of General Qasem Soleimani, Iran is almost certain to consider the use of cyber attacks. We talk with Levi Gundert at the firm Recorded Future about what cyber “payback” from Tehran might look like.
Eliminate the Password, Eliminate the Password Problem.
Weak, stolen or reused passwords are the root of 8 in 10 data breaches. Fixing the data breach problem means abandoning passwords for something more secure. But what does passwordless authentication even look like? Yaser Masoudnia, the Senior Director Product Management, Identity Access Management, at LogMeIn* takes us there.
Episode 172: Securing the Election Supply Chain
In this episode of the podcast (#172), Jennifer Bisceglie, the founder and CEO of Interos to talk about the links between America’s voting infrastructure and countries with a history of trying to subvert democracy.
Resolve to fix your Online Security Mess in 2020. Here’s how.
If you do nothing else in 2020, resolve to clean up the mess that is your online security. We give you some simple steps to level up your password and account security.