Winkeo-C FIDO2, hands on: A reliable and affordable USB-C security keyAdd FIDO2 to devices that don't have built-in security hardware. There's a little extra setup work, but the price is competitive.October 27, 2022 by Mary Branscombe in Security
Ethical Hacking, book review: A hands-on guide for would-be security professionalsDaniel G Graham's book won't help hackers who already have a wide range of tools to attack networks and devices. But it will help defenders who want to turn those techniques to more benevolent use.November 23, 2021 by Mary Branscombe in Security
Crypto Dictionary, book review: A useful A-Z of cryptography definitionsThis slim, opinionated, technical and intermittently amusing volume is one to flip through and repeatedly return to.July 12, 2021 by Mary Branscombe in Security
Cybersecurity is heading into a recruitment crisis: Here's how we fix the problemBusinesses need to think about security differently, from the kinds of people they hire and how they recruit them, to the role of the security team.November 15, 2019 by Mary Branscombe in Security
PassProtect tells you if your password has been pwnedThe right time to tell me my password has been exposed is before I use it; this extension can help.May 25, 2018 by Mary Branscombe in Security
If browsers are the new operating systems, why don't they have the security to match?The microphone, the camera, the clipboard, all of your files; now that the browser is close to an OS, what controls should there be for security and privacy?January 23, 2018 by Mary Branscombe in Security
Trust on the internet: Vital, but more complicated than everEncryption, and our trust in it, is what makes the web so powerful - but there's plenty that could undermine that.June 1, 2016 by Mary Branscombe in Security
Windows Phone and the battle against fake appsWindows Phone is popular enough for makers of fake apps to target it, but shouldn't it be harder for them to make it into the store? May 22, 2014 by Mary Branscombe in Security
In praise of inefficient technology and creative mistakesWhen you automate a system designed around messy human beings, the resulting efficiency can make everyone unhappyMarch 27, 2014 by Mary Branscombe in Security
The Practice of Network Security Monitoring, review: A hands-on guidebookA determined attacker can get into any network; this book is a practical guide to spotting them quickly when they arrive and ejecting them before serious damage is done.September 12, 2013 by Mary Branscombe in Security