Computer Security Day: Your devices, your data, and you

Computer Security Day: Your devices, your data, and you

The ‘80s are known for a number of things: Bowie, Back to the Future, and big hair, to name a few. But it was also a decade of increased computer usage and the early years of the internet – developments that led to the first Computer Security Day in 1988. Marked on...
How to avert an evil-maid attack

How to avert an evil-maid attack

Protect your corporate computer from unauthorized physical access. An evil-maid attack is just about the most primitive type of attack there is, but it’s also one of the most unpleasant. Preying on unattended devices, the “evil maid” tries to steal secret information...
Runaway SaaS Spend:  Salesforce and ServiceNow

Runaway SaaS Spend: Salesforce and ServiceNow

“Salesforce and ServiceNow.  Those are the new Oracles that if you are not managing the contract terms very closely, the costs spiral out of control.  The monitoring and governing of SaaS saved us a lot and we have more reasonable terms now.  Just the...
How Scanners Find Vulnerabilities

How Scanners Find Vulnerabilities

Vulnerability scanners are not that different from virus scanners. In both cases, the goal of the software is to find something out of the ordinary in the target. A virus scanner scans local resources and local storage of a computer to find potentially malicious...