Cloud Security For The Healthcare Industry: A No-Brainer

The healthcare industry has become one of the likeliest to suffer cyber-attacks, and there’s little wonder why. Having the financial and personal information of scores of patients makes it a very appetizing target for attackers. Just over a … Continue reading Cloud Security For The Healthcare Industry: A No-Brainer

Indonesian Hacker Group Cashes In On Blockbuster Movie Titles

When breaking the law isn’t a barrier, there’s always a way to make a quick buck. We see it every day, and this time from an Indonesian cybercrime campaign infecting vulnerable websites by luring their visitors to a network of scam websites… Continue reading Indonesian Hacker Group Cashes In On Blockbuster Movie Titles

Monitoring Data & Data Access to Support Ongoing GDPR Compliance – Part III: Tools

The new European Union (EU)-wide General Data Protection Regulation (GDPR) was signed into law in late April 2016, and the compliance deadline came into effect on May 25, 2018. The Regulation is expansive and covers a variety of subject areas, provisio… Continue reading Monitoring Data & Data Access to Support Ongoing GDPR Compliance – Part III: Tools

Facebook, GDPR and the Right to Privacy: Three’s a Crowd?

Back in 2016 the European Union voted to pass the mother of all security laws, aimed at further extending the rights of its citizens to control how their data is used. The General Data Protection Regulation (GDPR) guards users against having their info… Continue reading Facebook, GDPR and the Right to Privacy: Three’s a Crowd?

I Ate a Canadian Tasting Menu for Astronauts and It Was More Swanson Than ‘Jetsons’

The menu for astronaut David Saint-Jacques’s mission into space included maple leaf cookies and a whole lot of fish. Continue reading I Ate a Canadian Tasting Menu for Astronauts and It Was More Swanson Than ‘Jetsons’

The AI’ker’s Guide to the (cybersecurity) Galaxy

As a security veteran, I find myself from time to time having to explain to newbies the importance of adopting a ‘hacker’s way of thinking’, and the difference between hacker’s thinking and builder’s thinking. If you can&#… Continue reading The AI’ker’s Guide to the (cybersecurity) Galaxy

2017 OWASP Top 10: The Good, the Bad and the Ugly

Since its founding in 2001, the Open Web Application Security Project (OWASP) has become a leading resource for online security best practices. In particular, its list of the top 10 “Most Critical Web Application Security Risks” is a de fac… Continue reading 2017 OWASP Top 10: The Good, the Bad and the Ugly

2017 OWASP Top 10: The Good, the Bad and the Ugly

Since its founding in 2001, the Open Web Application Security Project (OWASP) has become a leading resource for online security best practices. In particular, its list of the top 10 “Most Critical Web Application Security Risks” is a de fac… Continue reading 2017 OWASP Top 10: The Good, the Bad and the Ugly

Social-Engineer Newsletter Vol 06 – Issue 83

    Vol 06 Issue 83 August 2016 In This Issue “Don’t make THAT face!” Mastering nonverbal SE Social-Engineer News Upcoming classes THE NEWS As a member of the newsletter you have the option to OPT-IN for special offers. You can click here to do that. Check out the schedule of upcoming training on Social-Engineer.com Continue Reading >

The post Social-Engineer Newsletter Vol 06 – Issue 83 appeared first on Security Through Education.

Continue reading Social-Engineer Newsletter Vol 06 – Issue 83