by ray | Dec 30, 2022 | ITAR
Data subject to ITAR or EAR (Export Administration Regulations) export control restrictions is referred to collectively as Controlled Information. NARA (National Archives and Records Administration) published 32 CFR Part 2002 Controlled Unclassified Information; Final...
by ray | Dec 30, 2022 | Security Breach
The Amazon-owned streaming platform Twitch has reportedly suffered a massive data leak, which has disclosed confidential company information, as well as streamers’ earnings, with more than 100GB of data posted to the internet on Wednesday. The documents appear to...
by ray | Dec 30, 2022 | Common Vulnerabilities and Exposures (CVE)
Google Chrome has well over two billion users worldwide and it not only dominates the web browser market, its Chromium core runs numerous browser alternatives. All of which makes Chrome the number one target for hackers and now Google has issued its fifth...
by ray | Nov 15, 2022 | Security
What Is a Web Application Firewall? Web Application Firewalls (WAFs) are software that monitor and filter traffic to a website with the goal of stopping anything harmful. WAFs look at web traffic before it gets to the website’s server, monitoring for potential...
by ray | Jul 4, 2022 | Security
NortonLifeLock Inc. is set to buy Avast Plc in a deal valued at as much as $8.6 billion, giving the U.S. cybersecurity company access to one of the biggest customer bases in the industry. Avast stockholders will receive cash and shares that value the...