Diana has continued our series looking at how to assess organisational risk when it applies to cyber security. This series is running on our sister site CyberAwake. Today’s article looks at some practical ways to understand your risks: Assess The Cyber Security Risk – CyberAwake …and the earlier risk articles… …
More Apple Updates
These updates are to address zero-day flaws that are being actively exploited. You need to get these Apple updates done Even if you (and your team) have automatic updates enabled – just check these Apple updates have been applied across all the impacted devices – both business owned devices and …
Why private needs to mean private
Public/Private Key encryption and security is one of the most powerful tools when it comes to building great cyber security – it is the security that the internet runs on. So when Microsoft reported a breach on a number of high profile Exchange Online mailboxes, no one expected that the …
Time to think about AI
Here is a thought provoking essay from the public-interest technologist Bruce Schneier: AI and Microdirectives – Schneier on Security Something to read with the morning coffee this weekend. It is actually “further listening – The BBC Reith Lectures, by Stuart Russell, Professor of Computer Science and founder of the Center …
It is getting to be a habit…
…to end the week with a malicious Android app: APT41 hackers target Android users with WyrmSpy, DragonEgg spyware (bleepingcomputer.com) If you need to know why you need to pay attention to these Android (and sometime Apple iOS) smartphone app cyber security threats, then read on here: Just Check – CyberAwake …
