There are 477 posts tagged. These could be essays, tumblelog entries, or other types of content.
Personally identifiable information (PII) and Personal Health Information (PHI) are critical concepts. They help identify information that needs additional safeguards and care.
Who did it? It's a powerful question and the answer to "What is attack attribution?"
Authentication and authorization are two critical concepts that are intertwined. Understanding the difference and their purpose is key to understanding cybersecurity.
Hackers and cybercriminals are all "malicious actors". While you may not know who is attacking a system, having a better understanding of common motivations is important.
Malicious software (malware) is an umbrella term that covers a number of different types of software designed to do bad things...but those specific categories don't mean to much day-to-day when it comes to defence...
VPNs can help secure your internet traffic when you're travelling. They can help you route around geographic restrictions. But is using a VPN exposing you to more risk? What is the impact of centralizing all of your internet requests with one specific company?
Perspective is a tricky thing...maybe the hardest aspect of cybersecurity