Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Manage APT Repositories on Debian or Ubuntu

Jump to Tutorial Advanced Package Tool (APT) is the backbone of package management on Debian and Ubuntu systems. It simplifies the process of installing, updating, and removing software. APT works with repositories — designated locations that host packages and update information. Mastering APT repository management ensures you have access to the software you need and that your system remains secure and up to date.

How To Securely Send Tax Documents

The most secure way to send tax documents is by using a platform with zero-knowledge encryption such as a password manager. Zero-knowledge encryption is one of the safest ways to store sensitive data because it encrypts and decrypts data at the device level, not the company’s servers or in the cloud. Using a password manager with zero knowledge removes the anxiety of having your sensitive information breached by unauthorized parties.

How To Protect Yourself From AI Voice Scam Calls

Artificial Intelligence (AI) being used to carry out cybercrime isn’t new, but as AI becomes more advanced, so do the tools that cybercriminals are using. One of the most recent AI-enabled cyber threats we’ve seen is cybercriminals using voice-cloning technology to carry out scam calls. You can protect yourself from AI voice-cloning scam calls by blocking spam calls, not picking up calls from unknown numbers and creating a safe word with your family in case a legitimate emergency occurs.

Navigating the Maze: Overcoming Security Issues in IoT

Security issues in IoT are a pressing concern as the number of connected devices skyrockets. What vulnerabilities are these devices exposed to, and what can be done to secure them against escalating cyber threats? This article provides a no-nonsense overview of the inherent risks in the IoT landscape and the steps necessary to maintain the integrity and safety of IoT ecosystems.

World Backup Day and the Importance of Being Prepared

It’s been nearly 365 days since the last World Backup Day, and we’ve got a lot to discuss. Let’s see, I completed my annual rewatch of The Sopranos. I took a deep dive into the SEC’s new cybersecurity rules and the nature of “materiality.” My wife and I finally agreed on a new sectional for the living room. What else … OH YEAH AND WE HAD A KID. Like I said, it’s been quite the year.

Lessons learned from the Google trade secret theft indictment

On Wednesday, March 6th, 2024 the US Attorney’s Office of Northern California announced that a federal grand jury had indicted Linwei Ding on four counts of trade secrets theft. Ding was arrested in Newark, California and now faces up to 10 years in prison and a fine of $250,000. We did a deep dive into the indictment to understand what happened and help security leaders and practitioners apply lessons to their own information security practice. Read on to learn more!
Featured Post

SMEs Invest in Tech Opportunities but Risk Missing Security Safeguards

Across Europe, 100 million people are employed by small and medium-sized enterprises (SMEs). The UK has over five million SMEs, providing three-fifths of employment and £2.4 trillion in turnover. As a vital component in the national economy, SMEs must continue to invest in automation, technology-led innovation, and underpin this with strong security.

Employee Clock-In Systems: Balancing Efficiency and Employee Satisfaction

How can businesses ensure that their employee clock in system maximize productivity without compromising employee satisfaction? This delicate balance often poses a significant challenge for many organizations. By ensuring the right blend of efficiency and satisfaction, companies can not only boost their operational success but also foster a positive work environment. As we proceed, we'll explore various strategies to achieve this balance, leaving you equipped to make well-informed decisions regarding your own company's clock-in system.

Code Review Practices: Cultivating a Culture of Clean Code within Development Teams

Every day, development teams rely on reviews to ensure high-quality code, encourage knowledge sharing, and strengthen professional relationships. By including the whole team in driving the growth of the base and enforcing its standards, they provide developers with the certainty that their contributions achieve the highest standards. On top of that, they head off technical debt and bring attention to chances for praise and positive reinforcement.

Top tips: Three hacks to safeguard your privacy online

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re looking at three hacks to secure your online privacy. In today’s world, we exist online as much as offline. There’s few mysteries left in our lives. Most information you need about a person is a few clicks away.