Cybersecurity

The History of IoT Security

There’s a significant danger that the rapid pace of IoT advancement is potentially outstripping the development of the IoT security infrastructure. The Internet of Things may sound like a recent phenomenon but its roots can be traced back to the 19th Century. In fact, the concept of connected devices dates back to 1832. Read more

Fun: Cut the cable

For network safety? You might have seen earlier this picture at https://9gag.com/tag/firewall/fresh or many other sites. You can’t hack an air gap! That seems to be real. Not a fake meme. That was a special run of cable made specifically for the OHM conference in 2013 https://www.bit.nl/news/115/88/Cut-here-to-activate-firewall-layer-1-firewalls-op-OHM2013. There is picture in Pinterest and Starecat of

The Sender Policy Framework (SPF)

The Sender Policy Framework (SPF) is an email authentication protocol that is designed to help prevent email spam and phishing attacks. It works by allowing email administrators to specify which IP addresses are authorized to send emails on behalf of a particular domain. When a receiving mail server receives an email, it can check the