Loading

List of data breaches and cyber attacks in…

The shortest month of the year is over in a flash, but not before a significant number of data breaches and cyber attacks could take place. I count this month’s total of leaked records to…

How to Set Up Metrics to Optimize Your…

Posted by acarlisleOver the past six years, our team at Fractl has studied the art of mastering content marketing press coverage. Before moving into Agency Operations, I on-boarded and trained over a dozen new associates…

Stealing Nativity Displays

The New York Times is reporting on the security measures people are using to protect nativity displays.Read more: schneier.com

Human Rights by Design

Good essay: "Advancing Human-Rights-By-Design In The Dual-Use Technology Industry," by Jonathon Penney, Sarah McKune, Lex Gill, and Ronald J. Deibert: But businesses can do far more than these basic measures. They could adopt a "human-rights-by-design"…

Loading

MD5 and SHA-1 Still Used in 2018

Last week, the Scientific Working Group on Digital Evidence published a draft document -- "SWGDE Position on the Use of MD5 and SHA1 Hash Algorithms in Digital and Multimedia Forensics" -- where it accepts the…