Why aren’t governments taking steps to make end-user products more secure in terms of IT security? [closed]

Obviously some manufacturers do not care too much about making their products secure and the vulnerabilities, if any, are only found by volunteer hackers, it at all – for example in IoT products.
Most end users cannot take (advanced) prote… Continue reading Why aren’t governments taking steps to make end-user products more secure in terms of IT security? [closed]

How to prevent endpoint data from being modified and endpoint client application from being modified

Let’s say an online system uses mostly endpoint storage for storing all kinds of private or sensitive data for each of the client/user, this way the server at the least has some post-data-leakage security.
What I am concerned about are the… Continue reading How to prevent endpoint data from being modified and endpoint client application from being modified

Helping Remote Workers Overcome Remote Attacks

Because remote workers’ devices are all connected to a home network, they don’t even need to be attacked directly. Instead, attackers have multiple avenues of attack that can be exploited. Continue reading Helping Remote Workers Overcome Remote Attacks

THROWBACK – End User Security Awareness Training: Hot or Not?

End user security awareness training is a hot topic in the infosec world. Why is there so much debate over this? What are the views of those in the industry? Paul chats with a panel of guests to discuss this very subject! Full Show Notes Subscribe to o… Continue reading THROWBACK – End User Security Awareness Training: Hot or Not?