Posts Tagged ‘Hacking’
ONELOGIN BREACH, WHAT HAPPENS NOW?
Well, it has happened again. Unsecured API keys have lead to a major data breach affecting a broad swath of the web. This is not a fun post to write, and we do so not to pour salt in the wounds of anyone in the community. We do it to bring light to a often…
Read MoreHOW TO PREVENT SENSITIVE DATA EXPOSURE
If you own a computer or mobile device, is it really yours? Yes and no. It’s a trick question, because although they’re our possessions, anything stored on them may be shared or owned by someone else. In our increasingly digital world, we’re always at risk of sensitive data exposure. It sounds scary, and it is.…
Read MoreSMALL BUSINESSES NEED KEY MANAGEMENT TOO
We’ve posted on the blog previously explaining the process and benefits of API key management as a security solution. But as a refresher…your data is collected, encrypted, and stored online. This data, though encrypted, is only as secure as the API keys which allow access to it. It is the case, then that, your encrypted data is…
Read MorePART 2: MORE VULNERABLE THAN WE THINK
This is the second in a two part series in which we explore the vulnerability that our increasingly technological and interconnected world presents us with. The first post outlined a presentation by Avi Rubin who outlines some the broad “hackability” of our lives and some of the technological developments which will add a new level of risk…
Read MorePART 1: MORE VULNERABLE THAN WE THINK
This is the first in a two part series in which we’re exploring the vulnerability that our increasingly technological and interconnected world presents us with. This first post outlines the highly creative presentation of Avi Rubin who points to the broad “hackability” of our lives. In the following post we’ll take a step back and…
Read More