Lessons Learned from Six Major Data Breaches TAGS: data breach “Every security breach that we read about in the news provides us with an opportunity to reflect upon the root …Continue reading →
May 19, 2024
Lessons Learned from Six Major Data Breaches TAGS: data breach “Every security breach that we read about in the news provides us with an opportunity to reflect upon the root …Continue reading →
Security, Privacy and Confidentiality: What’s the Difference? TAGS: cybersecurity | privacy Campus administrators and faculty understand the importance of protecting sensitive student information. The past two decades have brought us a variety …Continue reading →
Don’t Be Victimized by a Supply Chain Attack TAGS: vulnerability testing Six years ago, a major U.S. retailer suffered one of the most famous data breaches in history. Attackers compromised the …Continue reading →
The difference between AES and DES encryption TAGS: AES | block cipher | DES | encryption Data Encryption Standard and Advanced Encryption Standard sound similar, and both are examples of symmetric block ciphers. That is where …Continue reading →
Understanding FERPA: How K–12 Schools Can Update Their Data Privacy Approach TAGS: data privacy Administrators and educational staff at schools around the country understand the importance of protecting student privacy. The Family Educational Rights …Continue reading →
Is certification a reliable means of learning new IT skills and concepts? TAGS: security certifications Earning a technology certification requires some significant investments of both money and time. Candidates purchase study materials, pay tuition for …Continue reading →
How to encrypt and secure a website using HTTPS TAGS: HTTPS | website security Encrypting web content is nothing new: It’s been nearly 20 years since the publication of the specification for encrypting web …Continue reading →
Fact or Fallacy: Stay Up to Date on the Best Practices for Password Security How much do you know about passwords? You might believe password authentication is old hat, and that you already know …Continue reading →
Wireshark tutorial: How to use Wireshark to sniff network traffic TAGS: network security | Networking | Wireshark Wireshark continues to be one of the most powerful tools in a network security analyst’s toolkit. As a network packet …Continue reading →
5 Questions to Ask About Buying AI-Enabled Security Software Security products incorporating artificial intelligence techniques may reduce the workload for human analysts,taking over the time-consuming job of correlating information sources and mining …Continue reading →