Security and privacy Security and privacy feed

With the increasing popularity of the Internet of Things and cloud services, encryption and security best practices are more important than ever.


PWM puts responsibility for password resets in users' hands, freeing IT for more pressing tasks.

Raspberry Pi is a great way to learn about computer security. Learn how in the 11th article in our getting-started series.
old school calculator

This game builds risk mitigation into your workflow before iteration planning to decrease security threats.
Chat bubbles

Open source voice-assistant technology aims to avoid the privacy and security vulnerabilities seen in proprietary tech.

Centralizing logs and structuring log data for processing can mitigate risks related to insufficient logging.

Do you want J. Random Hacker to be able to pretend they're your bank?
lock on world map

A step-by-step survival guide to reduce your vulnerability to the next database disaster.
lock on world map

Learn about a pen-testing tool intended to test the security of WiFi access points for all types of threats.