Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

Reports of Stalking Via Apple Airtags

It seems that Apple may have an issue with their AirTags, the small tracking devices that use the Apple device network to help you find items that you have put trackers on. They are similar although much more effective than items like Tile. The problem is that since these trackers can ping out to any Apple device, there was a chance that they could be used for shady purposes. This possibility was brought up when they were launched and surprisingly, Apple listened. They added in methods to detect if someone is tracking you using an AirTag. True, not releasing something like this would have been better, but some protection is better than nothing.

Details
By Sean Kalinich
Sean Kalinich
Jan 17
Hits: 1007
  • Apple
  • Security
  • airtags
  • digital stalking

Read more: Reports of Stalking Via Apple Airtags

No comments on “Reports of Stalking Via Apple Airtags”
Security Talk

Security and the Small Business Owner

“InfoSec” is a term that is most often associated with the enterprise class organization. However, information security is something that every business should be practicing. As we have talked about before the importance of building a security culture in even the smallest business is vital. Having good security practices for your business secures your revenue and your customers’ data (and money). A breach to a one 1-4 employee business can mean the end of the business. The downside is that most security tools are priced outside of the small business range or require a minimum license purchase that ends up having the same effect. So, what is a small business owner to do when it comes to ensuring they have a secure environment?

Details
By Sean Kalinich
Sean Kalinich
Jan 17
Hits: 938

Read more: Security and the Small Business Owner

No comments on “Security and the Small Business Owner”
Security Talk

Secure Infrastructure in the distributed workplace

There was a time when the thought of secure infrastructure would bring items like properly configured IDS/IPS, Firewalls, Switches and Routers with hefty ACLs and 802.1x to mind. However, after Covid and even a bit before the traditional walled layout of the business network design was starting to become outdated. Remote workers and BYOD meant that not everyone could shelter safely inside the castle walls (not that they were safe before). Now IT and Security teams now had a much bigger area to observe and protect. The task becomes harder; much, much harder, but not impossible. The tools change and how you deploy, monitor, and update these tools also change. Let’s look at how to expand the concept of secure infrastructure into the modern distributed workforce.

Details
By Sean Kalinich
Sean Kalinich
Jan 13
Hits: 1108
  • SecureView
  • AntiMalware
  • Cloud Security
  • Risk Management
  • SOAR
  • Endpoint Protection
  • SIEM
  • IAM
  • Asset Management
  • Secure Infrastructure

Read more: Secure Infrastructure in the distributed workplace

No comments on “Secure Infrastructure in the distributed workplace”
Security Talk

All-in Vulnerability and Risk Management

It is a common belief that vulnerability management is nothing more than scanning and patching. However, as we have seen in many breaches and attacks, this is far from true. Vulnerability management is about understanding your organization and the risks it faces. Risks that an organization faces can include insider threats, public exposure, data leakage, improper configurations or safeguards, data integrity models, and quite a bit more. It is not enough to simply scan with a specific flavor of vulnerability scanner, it is a much larger effort and requires buy-in from every team and person in an organization.

Details
By Sean Kalinich
Sean Kalinich
Jan 13
Hits: 1041
  • Security
  • Patching
  • Vulnerability Management
  • Risk Management
  • Security Culture

Read more: All-in Vulnerability and Risk Management

No comments on “All-in Vulnerability and Risk Management”
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33

Page 33 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech