Data Center Access Policy

Use these guidelines for the appropriate entry, presence, and operations conducted within your company’s data center. Customizable Document — A download ready for use as-is or for minor alterations. Strengthen Your Processes — The five-page document outlines badge and camera access, alarms, and more. Expertise and Effort — Written by Scott Matteson via 10 hours

Password Management Policy

Use these guidelines for the consistent and secure management of passwords for employees and system and service accounts. Fully Customizable — Good to use as-is or alter as you see fit. Enhance Your Processes — This eight-page document outlines device management strategies, password changes, and more. Expert Authorship — Created by Scott Matteson through 16

New EU Social Media Guidelines Go Into Effect

Data rippling out from the stars of the European Union.

Image: mixmagic/Adobe Stock Beginning Friday, August 25, users of X (formerly Twitter), TikTok and the other large social media apps in the European Union saw major changes to those platforms. The largest social media apps, search engines and app stores in the EU now fall under the jurisdiction of the Digital Services Act. Friday was

How to Protect Against Cyber Threats Before They Hit

Today, all businesses are at risk of cyberattack, and that risk is constantly growing. Digital transformations are resulting in more sensitive and valuable data being moved onto online systems capable of exploitation, thus increasing the profitability of a successful breach. Furthermore, launching a cyberattack is becoming more accessible. Exploit kits and malware-as-a-service offerings are becoming

Billions of Devices at Risk of Hacking & Impersonation Due to Hidden Commands

Tarlogic team giving their presentation during RootedCON.

Tarlogic team giving their presentation during RootedCON. Image: Tarlogic Billions of devices worldwide rely on a widely used Bluetooth-Wi-Fi chip that contains undocumented “hidden commands.” Researchers warn these commands could be exploited to manipulate memory, impersonate devices, and bypass security controls. ESP32, manufactured by a Chinese company called Espressif, is a microcontroller that enables Bluetooth

Qualcomm, Intel, and Others Form Ambient IoT Coalition

Organizations including Qualcomm and Wiliot have announced the formation of the Ambient IoT Alliance, a multi-standard ecosystem of ambient IoT manufacturers, suppliers, integrators, operators, users, and customers. Ambient IoT is an ecosystem for devices that draw energy from ambient radio waves, light, motion, heat, or any other widely available, pervasive source. Bluetooth, 5G Advanced, and