Posted by SecurityArchitecture on Sunday, August 16, 2015
If you have a public website, you should know that your site is regularly scanned and otherwise accessed, both by web “crawlers” from Google, Bing, and similar search engines and by individuals or agents with less…
Posted by SecurityArchitecture on Wednesday, August 12, 2015
While 2FA is by no means foolproof, for most users adding some form of two-step verification in the authentication process makes their accounts much less susceptible to compromise by unauthorized users.
Posted by SecurityArchitecture on Thursday, August 6, 2015
The split among appellate courts on the privacy of cell site location data raises the likelihood that the issue will need to be addressed by the U.S. Supreme Court.