We’re living in a world where we are frequently told that decreasingly-small actors can do big damage to those once considered great hegemonies, and technology is often cited as the cause of this rebalancing of power. There are plenty of reasons to be skeptical of this.
As whole parts of the internet went down yesterday, it felt very much like this would be how world war three would most likely start. But can attribution really be pinned on a state actor as industry leaders have suggested?
Brandolini's law, better known as the Bullshit Asymmetry Principle, states that "the amount of energy necessary to refute bullshit is an order of magnitude bigger than to produce it." Disinformation today poses a challenge without precedent to the functioning of both modern democracies and economies alike.
In cybersecurity there is a well accepted three-way trade-off between usability, functionality, and security. The trade-offs inherent to globalism are no different. Brilliantly designed products seek to mitigate costs, and our political leadership could be doing more.
Considered the “biggest, most systemic risk” threat the insurance industry faces and a growing "national emergency" by the US government itself, the threat of cyberattack is real and present. Most organisations fail to realise the ways in which they are targets however and thus continue to underinvest in cybersecurity. This article introduces the four main tools at the disposal of policymakers seeking to improve cybersecurity at large.
Dropbox is a trusty tool used by teams and businesses around the world to communicate. But is there anything better? In a resource-intensive fast-paced environment Dropbox can seem slow and bottleneck progress. We wanted to know whether a new tool from BitTorrent, Sync, could outperform.
Generating secure passwords is easy, quick and simple. In this article we cover what makes a strong password, how to remember dozens of complicated ones, how to avoid reusing the same password more than once, and how to quickly create random passwords on the go.
Multi-factor authentication adds an extra layer of security to your usage of websites like Gmail, Facebook, Twitter and Apple - as well as business-critical and often data-sensitive tools like AWS, Dropbox and Namecheap. Find out how you can enable multi-factor authentication on all these sites and more in this article.
Spearphishing is a targeted, disguised type of attack on an individual or organisation, appearing to originate from a known or trusted entity. Increasing in sophistication and number almost daily, even small businesses and operations now have consider how they might safeguard against such attacks. In this article we explore how.
Security conscious web users are well-aware that they should avoid reusing the same website across multiple websites. But how practical is it to have a hundred different passwords for as many different online services? Without a password management system such a feat becomes nigh-impossible. Here we take a look at three leading password managements solutions to help you determine which one is right for you.