Security Cloud Courses About

Tagged With 'Risk'

<< More tags

imgs/thumbnail.webp
RSAC 2021

A purely digital RSAC 2021 kicks off looking back at a challenging year and to the challenges ahead for the security community.

imgs/thumbnail.webp
Passwords Suck

Passwords are the worst. Trying to pick a “secure” one makes the whole thing worse. Every site and service has it’s own variation on …

imgs/thumbnail.webp
Legacy Authentication Risks

The Canada Revenue Agency suffered a large breach exposing over 5,000 citizens to COVID-19 benefit fraud. This issue exposes some of the challenges of …

imgs/thumbnail.webp
Should I Worry About TikTok?

Is a social network focused on dancing, lip syncing, and fun a threat to national security just because of who owns it? Is TikTok a threat to national …

imgs/thumbnail.webp
Risk Decisions in an Imperfect World

Security is often spoken of in absolutes. Is this secure? Is that insecure? The reality is that security is a spectrum. It is a series of implicit and …

imgs/thumbnail.webp
Keep Decisions Up To Date

Decisions are hard enough that you don’t want to have to revisit them constantly. But that’s exactly what is required in the realm of …

imgs/thumbnail.webp
DRUGS!!! and IT Risk and Graphs

Many questions come along with the federal legalization of cannabis in Canada. It’s a massive example of trickle down risk as various controls …

imgs/thumbnail.webp
Cybersecurity Basics #11a - Risk Assessments Redux

In your personal life you’re assessing risk constantly whether you know it or not. In the digital world the same thing happens BUT you probably …

imgs/thumbnail.webp
Cybersecurity Basics #11 - Risk Assessments & Pen Tests

Risk assessments are useful when kept in context and continually updated. A penetration test (or pen test) is when your system undergoes a …

imgs/thumbnail.webp
Ignorance & Risk

Some perceptions override the logic behind risk decisions. How do you fight through to make a sound decision?

imgs/thumbnail.webp
Terms of Service

Terms of Service agreements hide all manner of tricks and cede all of the power to the issuing corporation. Should they?

imgs/thumbnail.webp
Organizational Design and OT Risk

Sometimes the digital world has an impact on the real world…and it’s not always a positive one.

imgs/thumbnail.webp
Apple iOS 11 Security

SXSW, Canadian budget, Apple, and more

imgs/thumbnail.webp
Risk Assessments & The Risk Of No Data

Good data drives good decisions. This is a major problem in cybersecurity where the data simply isn’t available or accurate.

imgs/thumbnail.webp
Another Day, Another Data Breach

Why do all incident response communications from customers feel the same? Why do they all miss the mark? How hard is it to do better?

imgs/thumbnail.webp
What You Need to Know About Shellshock, aka the 'Bash Bug'

Shellshock is a surprising bug. Hidden for decades, what do you need to know to help your organization respond?

imgs/thumbnail.webp
The Code Spaces Nightmare

Code Spaces is the worst case scenario. A simple misconfiguration in the cloud cost them their business.