
How to Read Your iOS 15 App Privacy Report
Your iPhone now gives you lots of transparency into what your downloads are up to. Here’s what to look out for.
How to Read Your iOS 15 App Privacy Report Read MoreNews and information resources.
Your iPhone now gives you lots of transparency into what your downloads are up to. Here’s what to look out for.
How to Read Your iOS 15 App Privacy Report Read MoreSimple cyber hygiene steps consumers can take to improve the cybersecurity of their mobile devices.
Mobile Device Cybersecurity Checklist for Consumers Read MoreData Privacy Week helps spread awareness about online privacy and educates citizens on how to manage their personal information and keep it secure. Data Privacy Week also encourages businesses to respect data and be more transparent about how they collect and use customer data.
Data Privacy Week – 2022 Read MoreThis is a CISA-managed catalog of known exploited vulnerabilities that carry significant risk to the federal enterprise.
Known Exploited Vulnerabilities Catalog Read MoreThese documents cover enhancing the Trusted Internet Connections (TIC) program to fully support the implementation of IPv6 in federal IT systems. This information is also applicable to the private business sector and those interested in improving Internet security.
CISA Releases Guidance: IPv6 Considerations for TIC 3.0 Read MoreSo, what can government and business leaders do to combat these attacks? And who’s responsible for improving our cybersecurity?
How America Can Reliably Resist Ransomware Read MoreThis paper provides Microsoft’s recommendations for password management based on current research and lessons from our own experience as one of the largest Identity Providers (IdPs) in the world. It covers recommendations for end users and identity administrators.
Microsoft Password Guidance Read MoreThis website is the U.S. Government’s official one-stop location for resources to tackle ransomware more effectively.
StopRansomware.gov website – The U.S. Government’s One-Stop Location to Stop Ransomware Read More“Light Blue Touchpaper” is the blog of the University of Cambridge Computer Laboratory and is written by researchers in the Security Group. Read here brief and timely essays on recent developments and topics related to computer security.
Light Blue Touchpaper Read MoreUse the nine “Avalanche Problems” to understand avalanche types. Learn to approach the mountain with an eye toward current avalanche conditions and avalanche problems to assist in making wise terrain choices.
Avalanche Problems Toolbox Read MoreAs technology—especially computer, information, and Internet technology—permeates all aspects of our society, people who understand that technology need to be part of public-policy discussions. We need technologists who work in the public interest. We need public-interest technologists.
Public-Interest Technology Resources Read MoreThe National Cyber Security Alliance’s (NCSA’s) CyberSecure My Business™ is a national program helping small and medium-sized businesses (SMBs) learn to be safer and more secure online.
CyberSecure My Business Read MoreThe Wasatch Backcountry Skiing Map is a three-dimensional map that, along with the companion Wasatch Backcountry Skiing Guide, provides a wealth of backcountry information. Cottonwood Canyons Weather Dashboard provides all you need to know weather-wise for the Cottonwood Canyons.
Wasatch Backcountry Skiing Guide & Map Read MoreSecurity – Your daily briefing on security, freedom, and privacy in the WIRED world.
WIRED.com – Security Read MoreNews about Computer Security (Cybersecurity), including commentary and archival articles published in The New York Times.
The New York Times – Computer Security / Cybersecurity News Read MoreI am a public-interest technologist, working at the intersection of security, technology, and people. I’ve been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998. I’m a Special Advisor to IBM Security, a fellow and lecturer at Harvard’s Kennedy School, and a board member of EFF. This personal website expresses the opinions of none of those organizations.
Schneier on Security – “Crypto-Gram” Newsletter Read MoreCyberScoop is the leading public sector media company reaching top cybersecurity leaders both online and in-person through breaking news, newsletters, events, radio and TV.
CyberScoop Read MoreThe latest news, opinion and research in security, from Communications of the ACM online.
Communications of the ACM – Security Read More‘New York Times’ reporter David Sanger says the world’s leading producer of telecom equipment, China’s Huawei, will be central to the spread of a global 5G network — which could pose a major threat to U.S. national security. “The 5G …
The 5G Network & The Possible Threat To Cybersecurity Read MoreThe SANS Institute was established in 1989 as a cooperative research and education organization.
SANS Webinars & Information Security Resources Read More