What We’re Listening to — Information Security Podcasts
The FireOak team keeps an eye out for and shares the most interesting audio based resources, like podcasts, related to managing, sharing, and securing information, data, and knowledge.
The FireOak team keeps an eye out for and shares the most interesting audio based resources, like podcasts, related to managing, sharing, and securing information, data, and knowledge.
Is your staff ready to work from home en masse? Consult the FireOak Strategies Coronavirus Cybersecurity Checklist to prepare your organization.
What’s the state of email security for the 2020 presidential candidates? And what about the security of candidates’ websites? Read more for our analysis!
Over the past few years, responsible data has become a hot topic within the world of international development and humanitarian aid. As funding agencies push for open data and data-driven decision making, and digital technologies continue to evolve, development workers, researchers, and other individuals involved in supporting aspects of the data lifecycle are becoming increasingly concerned with what it means to responsibly collect, manage, transmit, and share data in responsible ways.
In January 2019, a massive database of email addresses and passwords was released on the internet. The collection included over 773 million unique email addresses and 21 million unique passwords, credentials that were assembled from many data breaches.
There’s no question, VMs are fantastic. But like anything that is cheap and easy, they have a tendency to persist long past their usefulness. Why invest the time and energy to retire a VM?