My blogpost on this topic at Oversitesentry shows the NIST-80063B publication to note that a long password is better for overall security rather than a…
Do you want to spend money before or after a hacker attacks you? Do you think you are not being attacked because you are too…
What if you could see some examples of real life attacks? What about a phishing email attack? Do you know the parts of an email…
Chatgpt Jan9 version (openai) software wrote an article on PCI4.0 upgrade — edited by tonyz to remove software developer items (many businesses do not develop…
One aspect of risk is the people in the company. In a sample company one has management, sales, production of a product or service (workers),…
Is it sad that we have to not trust others anymore? But it is a necessity for surviving on the Internet these days. Since everything…
Today’s news is typical for Cybersecurity: April Microsoft Patch Tuesday – (the day that Microsoft releases regular patches conveniently released once a month when possible)…
Example #1: March 28, 21 – Sick.codes has the information and chronology of a disturbing vulnerability found in some software. If one looks at the…
Yes we (as a society) have a problem. Most people do not want to talk about Cybersecurity for a variety of reasons (nod your head…
My latest blogpost at Oversitesentry discusses this image(below) among other things. After writing the blogpost I continued to research from my Security news analyzed page…