- Welcome Guest
- Sign In
Not long ago, I made the case that for most users file-level encryption is adequately secure and much higher-performing than full-disk encryption. I received a lot less pushback than anticipated for expressing this heterodox view -- by which I mean I actually got none. Quite to the contrary, some readers sent messages and comments expressing curiosity and eagerness to try file-level encryption.
Recently, I bumped into a friend (at an appropriate social distance because, yes, this is 2020) that I hadn't seen in a long time. The two of us have many common interests and little time to discuss them. But in the few minutes before parting ways, we immediately slid into discussing Linux. We talked distros, desktops, configurations, and everything in between...
The Linux desktop distros of today are the most accessible to complete newcomers as they have ever been. There was a time not long ago when only truly intrepid computer thrill seekers would dare install Linux. Now, not only can one get Linux installed on most desktop or laptop computer hardware in 15 minutes, but one can hand it off to anyone with the loosest grasp on how to use computers and expect them to be just fine...
Canonical's AdGuard Home Ubuntu Appliance is a new addition to the ranks of its appliances. With this offering, users can quickly implement a ready-made solution for blocking bothersome content at the network level on a home network. Doing so involves no more than downloading, installing, and booting the newly released lean Ubuntu image with the AdGuard Home service pre-installed and pre-configured...
It probably shouldn't, but it routinely astonishes me how much we live on the Web. Even I find myself going entire boots without using anything but the Web browser. With such an emphasis on Web-based services, one can forget to appreciate the humble operating system. ...
Average computer users would be forgiven for not having any idea what PGP is. There is so much going on below the surface of the modern computing experience that even critically important security tools like PGP are tucked away. ...
Like with any industry, the information security industry, more commonly referred to as "cybersecurity," for all its raging debates, has rallied around a small corpus of best practices ...
Never, in most of our lifetimes, have all corners of society collaborated to address a single grave threat as they have done in the fight against COVID-19. While epidemiological controls compose the first line of defense, technology is growing into a supporting role. So great is the potential for technology to help combat the pandemic that tools are being contributed even from unlikely places...
There has been a lot of debate in the public sphere around the degree and kind of legal regulation a society should apply to online speech. While the dialogue has become more intense and urgent in the last few years, the effort to impose limits on Internet speech has been contentious from the start. At the present juncture, Section 230 of the Communications Decency Act is undergoing reconsideration...
As someone with a nominal presence in the media, I try to stay aware of people's attitudes toward it. One common refrain is that, for understandable reasons, people feel worn down by the volume and composition of the media coming at them ...
By this, the fourth and final entry in this series, you should have a grasp of information security basics. Let's take stock of them before continuing down the rabbit hole ...
If you've followed this series on information security so far (Part 1 and Part 2), you should have a feel for which points in the communication process leave you exposed, and what kinds of tools cover them. ...
The preface to this security guide series, Part 1, outlines the basic elements that comprise a threat model, and offers guidance on creating your own. After evaluating the asset and adversary expressions of the threat model equation, you likely will have determined the danger level of your adversary -- and by extension, the caliber of its tools. ...
At this point, remarking that people now are more concerned about online privacy than ever before is not a novel observation. What's fascinating, though, is that interest in personal digital security has remained high since the issue exploded about seven years ago. In other words, instead of experiencing a short-lived spike, digital privacy awareness has been sustained...
Our roundtable participants were Laura DiDio, principal at ITIC; Rob Enderle, principal analyst at the Enderle Group; Ed Moyle, partner at SecurityCurve; Denis Pombriant, managing principal at the Beagle Research Group; and Jonathan Terrasi, a tech journalist who focuses on computer security, encryption, open source, politics and current affairs...
Participants in the discussion were Rob Enderle, principal analyst at the Enderle Group; Ed Moyle, partner at SecurityCurve; Denis Pombriant, managing principal at the Beagle Research Group; and Jonathan Terrasi, a tech journalist who focuses on computer security, encryption, open source, politics, and current affairs...
Roundtable participants contributing to the conversation were Laura DiDio, principal at ITIC; Rob Enderle, principal analyst at the Enderle Group; Ed Moyle, partner at SecurityCurve; Denis Pombriant, managing principal at the Beagle Research Group; and Jonathan Terrasi, a tech journalist who focuses on computer security, encryption, open source, politics and current affairs...
Taking part in the conversation were Laura DiDio, principal at ITIC; Rob Enderle, principal analyst at the Enderle Group; Ed Moyle, partner at SecurityCurve; Denis Pombriant, managing principal at the Beagle Research Group; and Jonathan Terrasi, a tech journalist who focuses on computer security, encryption, open source, politics and current affairs...
Contributors to the conversation were Laura DiDio, principal at ITIC; Rob Enderle, principal analyst at the Enderle Group; Ed Moyle, partner at SecurityCurve; Denis Pombriant, managing principal at the Beagle Research Group; and Jonathan Terrasi, a tech journalist who focuses on computer security, encryption, open source, politics, and current affairs...
On deck are Laura DiDio, principal at ITIC; Rob Enderle, principal analyst at the Enderle Group; Ed Moyle, partner at SecurityCurve; Denis Pombriant, managing principal at the Beagle Research Group; and Jonathan Terrasi, a tech journalist who focuses on computer security, encryption, open source, politics and current affairs...
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/antitrust-law.jpg
https://www.technewsworld.com/story/courts-regulators-pose-threat-to-apple-services-revenue-in-2024-178918.html
Courts, Regulators Pose Threat To Apple Services Revenue in 2024
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/Apple-Vision-Pro-with-battery.jpg
https://www.technewsworld.com/story/apples-vision-pro-the-slow-birth-of-spatial-computing-179000.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/Apple-Vision-Pro-living-room.jpg
https://www.technewsworld.com/story/did-ces-produce-any-serious-competition-for-apples-vision-pro-178961.html
Did CES Produce Any Serious Competition for Apple’s Vision Pro?
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/Mantic-Minotaur.jpg
https://www.technewsworld.com/story/lunar-lobster-is-dead-how-to-upgrade-to-ubuntu-23-10-mantic-minotaur-177260.html
Lunar Lobster Is Dead: How To Upgrade to Ubuntu 23.10 Mantic Minotaur
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/02/mobile-app-security.jpg
https://www.technewsworld.com/story/mobile-security-firms-fortify-defenses-as-app-attacks-accelerate-179003.html
Mobile Security Firms Fortify Defenses as App Attacks Accelerate
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/09/passwordless-computing.jpg
https://www.technewsworld.com/story/the-realities-of-switching-to-a-passwordless-computing-future-178579.html
The Realities of Switching to a Passwordless Computing Future
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/computer-programmers.jpg
https://www.technewsworld.com/story/ai-will-have-a-transformative-impact-on-software-development-in-2024-178950.html
AI Will Have a Transformative Impact on Software Development in 2024
https://www.technewsworld.com/wp-content/uploads/sites/3/2021/08/electric-car-charging.jpg
https://www.technewsworld.com/story/the-5-best-plug-in-hybrids-for-2024-178986.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/09/network-engineers-code.jpg
https://www.technewsworld.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/12/Wi-Fi-7.jpg
https://www.technewsworld.com/story/next-generation-wi-fi-7-standard-expected-to-be-finalized-in-early-2024-178845.html
Next-Generation Wi-Fi 7 Standard Expected To Be Finalized in Early 2024
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/phishing-attacks.jpg
https://www.technewsworld.com/story/browser-based-phishing-attacks-jump-198-in-second-half-of-2023-178980.html
Browser-Based Phishing Attacks Jump 198% in Second Half of 2023
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/CES-2024-Innovation-Showcase.jpg
https://www.technewsworld.com/story/10-products-from-ces-2024-that-set-the-innovation-bar-178966.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/SevaCare-Blood-Pressure-Monitor.jpg
https://www.technewsworld.com/story/sevacare-blood-pressure-monitor-offers-affordable-home-health-assurance-178951.html
SevaCare Blood Pressure Monitor Offers Affordable Home Health Assurance
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/home-hacker.jpg
https://www.technewsworld.com/story/paranoia-in-the-home-1-in-3-americans-worried-about-their-smart-gadgets-being-hacked-178954.html
Paranoia in the Home: 1 in 3 Americans Worried About Their Smart Gadgets Being Hacked
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/smartphone-user-happy.jpg
https://www.technewsworld.com/story/how-to-speed-up-a-suddenly-slow-android-phone-178982.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/11/iot-internet-of-things.jpg
https://www.technewsworld.com/story/synaptics-pivots-to-develop-its-own-iot-compute-solutions-178808.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/12/technology-2024.jpg
https://www.technewsworld.com/story/tech-forecast-2024-better-cyber-coexistence-productivity-privacy-178913.html
Tech Forecast 2024: Better Cyber Coexistence, Productivity, Privacy
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/12/tech-forecast-2024.jpg
https://www.technewsworld.com/story/rob-enderles-tech-forecast-for-2024-178841.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/10/TikTok.jpg
https://www.technewsworld.com/story/gen-z-millennials-turning-to-tiktok-for-career-advice-178731.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/linux-review-tux-keyboard.jpg
https://www.technewsworld.com/story/lindoz-returns-with-advanced-ai-to-revamp-the-makululinux-lineup-177239.html
LinDoz Returns With Advanced AI To Revamp the MakuluLinux Lineup
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/01/smartphone-shopping.jpg
https://www.technewsworld.com/story/att-transunion-launch-initiative-to-combat-business-call-spoofing-178995.html
AT&T, TransUnion Launch Initiative To Combat Business Call Spoofing
https://www.technewsworld.com/wp-content/uploads/sites/3/2021/02/electric-car-charging-3-1.jpg
https://www.technewsworld.com/story/the-5-best-electric-cars-on-the-market-178924.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/Dysolve-Game-Lobby.jpg
https://www.technewsworld.com/story/ai-powered-software-offers-breakthrough-for-treating-dyslexia-178937.html
AI-Powered Software Offers Breakthrough for Treating Dyslexia
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/smartphone-user-perplexed.jpg
https://www.technewsworld.com/story/affiliate-marketing-contributing-to-substandard-search-results-study-178978.html
Affiliate Marketing Contributing to Substandard Search Results: Study
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/08/e-waste.jpg
https://www.technewsworld.com/story/disorganization-not-cost-fuels-the-it-e-waste-crisis-178570.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/12/QR-code-scan.jpg
https://www.technewsworld.com/story/quishing-alert-experts-advise-caution-before-scanning-qr-codes-178824.html
Quishing Alert: Experts Advise Caution Before Scanning QR Codes
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/11/law-enforcement-investigators.jpg
https://www.technewsworld.com/story/tech-coalition-launches-initiative-to-crackdown-on-nomadic-child-predators-178773.html
Tech Coalition Launches Initiative To Crackdown on Nomadic Child Predators
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/12/Project-Kuiiper.jpg
https://www.technewsworld.com/story/amazons-competitor-to-musks-starlink-takes-critical-step-toward-deployment-178873.html
Amazon’s Competitor to Musk’s Starlink Takes Critical Step Toward Deployment
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/12/best-in-tech-2023.jpg
https://www.technewsworld.com/story/standout-tech-products-of-2023-178853.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/qualcomm-sign.jpg
https://www.technewsworld.com/story/qualcomm-takes-aim-at-redefining-mobile-and-pc-technology-178743.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/robot-at-lectern-1.jpg
https://www.technewsworld.com/story/the-robotic-wave-at-ces-178941.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/11/tv-set-top-box-with-remote.jpg
https://www.technewsworld.com/story/electronic-frontier-foundation-calls-for-ftc-action-on-poisoned-set-top-boxes-178797.html
Electronic Frontier Foundation Calls for FTC Action on Poisoned Set-Top Boxes
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/CES-logo.jpg
https://www.technewsworld.com/story/is-it-time-to-change-the-name-of-ces-178993.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/tech-in-2024.jpg
https://www.technewsworld.com/story/2024-tech-industry-predications-a-few-may-surprise-you-178919.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/11/Holiday-Shopping-Couple-1.jpg
https://www.technewsworld.com/story/the-essential-tech-gift-guide-for-2023-holiday-shoppers-178814.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/women-dont-play-emma-raz.jpg
https://www.technewsworld.com/story/women-dont-play-confronts-gender-disparity-in-the-tech-industry-178379.html
‘Women Don’t Play’ Confronts Gender Disparity in the Tech Industry