Remove Authentication Remove Blog Remove Education Remove Systems administration
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Krebs wrote for The Washington Post between 1995 and 2009 before launching his current blog KrebsOnSecurity.com. His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more. Dave Kennedy | @hackingdave.

article thumbnail

MY TAKE: Remote classes, mobile computing heighten need for a security culture in K-12 schools

The Last Watchdog

Keeler Keeler outlined how implementing three tried-and-true technologies — Single Sign-On (SSO,) multi-factor authentication (MFA) and virtual private networking (VPN) — can go a long way to locking down school networks. This column originally appeared on Avast Blog.). Acohido Pulitzer Prize-winning business journalist Byron V.

Security 276