This is an excellent academic article by Susan Landau on the privacy, efficacy, and equity of contract-tracing on smartphone apps. She raises some important points about the social and economic divide when it comes to technology, something that other developers and technologists should consider when creating their apps. Digital exposure …
The SolarWinds breach – a write up
SolarWinds and the Holiday Bear Campaign: A Case Study for the Classroom – Lawfare (lawfareblog.com) This is a considered and well researched article by Professor in Law Bobby Chesney, looking at the how and why of the much publicised and far reaching SolarWinds security breach and subsequent attacks on their …
You must do this if you use Microsoft 365
Do you want more security from ransomware? Michael, one of the support team over at Octagon Technology has written about one of the often overlooked steps by user of Microsoft 365. Microsoft 365 Security – Octagon Technology You should also look at their Pick-up and Go solution – 365R.
You cannot say enough about security
There is an article on the Octagon Technology site discussing their cyber security tools package. Security Built-in – Octagon Technology
When Hacking is a Competition
Before we go on – hacking competitions are not illegal and many of them are organised across the world each year. They give a chance for the white hat hacking community to improve their skills and can often find flaws in software that benefit all of us. Once a cyber …