Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Tom Henderson

Vendors up Browser Security Ante

Posted on January 11, 2019 by Tom Henderson

Vendors have been thickening browser security–slowly and assuredly–as the browser’s UI role increases. Continue reading Vendors up Browser Security Ante→

Posted in Uncategorized

Start a Security To-Do List

Posted on December 24, 2018 by Tom Henderson

Protecting an organization depends on deep knowledge and experience, but a security to-do list can go a long way toward locking things down. Continue reading Start a Security To-Do List→

Posted in Uncategorized

10 Points that Often Get Forgotten During Disaster Recovery Planning

Posted on December 3, 2018 by Tom Henderson

Based on client “scar tissue,” here are 10 disaster recovery planning lessons learned from experience. Continue reading 10 Points that Often Get Forgotten During Disaster Recovery Planning→

Posted in Uncategorized

Research Report: The State of IT Security

Posted on November 12, 2018 by Tom Henderson

Our survey of 232 IT and security professionals reveals IT security headaches — the top threats, top perpetrators, breach prevalence, factors that led to decreased vulnerability levels and more — as well as the steps IT pros are taking to combat the pr… Continue reading Research Report: The State of IT Security→

Posted in Uncategorized

How STIX, TAXII and CyBOX Combine to Form a Threat Intelligence Ecosystem

Posted on October 28, 2018 by Tom Henderson

Amalgamated threat intelligence is powerful, but procedural mechanisms need to evolve before widespread implementation becomes both cautious and effective. Continue reading How STIX, TAXII and CyBOX Combine to Form a Threat Intelligence Ecosystem→

Posted in Uncategorized

Bluetooth Vulnerabilities: Researchers Explore 'Side Channel' Attacks

Posted on October 24, 2018 by Tom Henderson

Side channel attacks make many kinds of “conversations” visible and adding to the list of Bluetooth vulnerabilities. Continue reading Bluetooth Vulnerabilities: Researchers Explore 'Side Channel' Attacks→

Posted in Uncategorized

Why the Zero Trust Model Is Ultimate Trust

Posted on September 10, 2018 by Tom Henderson

The zero trust model is the final departure from the concept of the secure perimeter. Continue reading Why the Zero Trust Model Is Ultimate Trust→

Posted in Uncategorized

The Evolution of Docker Container Security: Part 3

Posted on September 3, 2018 by Tom Henderson

When it comes to Docker container security, orchestration models favor integrated roles, network scrutiny and small attack surfaces with host protection. Continue reading The Evolution of Docker Container Security: Part 3→

Posted in Uncategorized

Data Destruction Services Ensure that Data is Sincerely Dead

Posted on August 14, 2018 by Tom Henderson

Vendor ecosystems offer both system refurb and data destruction services that can help companies meet compliance and security concerns. Continue reading Data Destruction Services Ensure that Data is Sincerely Dead→

Posted in Uncategorized

The Passwordless Authentication Future May Be Closer Than You Think

Posted on August 9, 2018 by Tom Henderson

Microsoft Edge joins Firefox and Chrome in adding support for the WebAuthN protocol, smoothing the path toward true passwordless authentication. Continue reading The Passwordless Authentication Future May Be Closer Than You Think→

Posted in Uncategorized

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Pentagon Reaches Agreements With Top AI Companies, But Not Anthropic May 1, 2026
  • Adapting a 100-Year-Old Lens To A Modern Camera May 1, 2026
  • ICANN Opens Applications For New Generic Top-Level Domains May 1, 2026
  • 45,000 Attacks, 5,300+ Backdoors Tied to China-Linked Cybercrime Operation May 1, 2026
  • Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st) May 1, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up