Determining a Personal Data Retention Strategy
If you spent any time in the IT world you’re likely to be particularly tuned to the threat risk of losing data. Losing data sucks,…
If you spent any time in the IT world you’re likely to be particularly tuned to the threat risk of losing data. Losing data sucks,…
If you haven’t heard of Safari Books Online it’s basically a massive collection of the most popular technical books (over 12,000) that you can access,…
Google illegally dominates two markets for online advertising technology, a judge ruled, dealing another blow to the tech giant and paving the way for US…
Waste and irrationality. I think many among the rich would be far more willing to pay a larger portion in taxes if they believed it…
I often take criticism for my desire to own expensive things, live in nice neighborhoods, eat in quality restaurants, and otherwise surround myself with what…
The Cybereason Global Security Operations Center (GSOC) has shed light on the sophisticated tactics used by the LummaStealer malware to evade detection and execute malicious…
Woolworths Group has renewed an agreement with Google Cloud for a further five years. The retailer said that it would look “to further strengthen data,…
I tripped over an article this week on creating “SSH Bookmarks”, which are basically aliases for hostnames within your ~/.ssh/config file. I think this is…
Ahold Delhaize confirmed Thursday that certain files from its U.S. operations were stolen in a November cyberattack after a threat group claimed credit for the…
A comprehensive study by zLabs, the research team at Zimperium, has found that over 43% of the top 100 mobile applications used in business environments…
I recently attended a company blogging conference call where the topic was how to properly categorize and tag posts for company blog posts. Despite a…
A critical vulnerability in the Erlang/OTP SSH, tracked as CVE-2025-32433, has been disclosed that allows for unauthenticated remote code execution on vulnerable devices. The flaw was…