Digital Security Articles & Newsletters

    Art lab punch clock

    Leaking on the clock: What your sources need to know

    Source protection Article

    Last week, Eric Trump tweeted a screenshot of an email that circulated through the Trump Organization by Washington Post reporter David Fahrenthold. Although the tweet sensationalized Fahrenholt’s emails, it should fall short of qualifying for reality TV levels of drama, since reporters do this sort of thing all the time. But are there other considerations to take in mind when reaching out to sources in their workplaces?

    default social card (URL location fixed)

    Your password was breached. Now what?

    Account security Guide

    Data breaches, and in particular those including personal passwords for websites or apps, are evergreen news stories that repeat themselves like an Advent calendar for cybersecurity failures. Although these breaches are a regular phenomena, they are trailed by a long, drawn-out window of time where other attackers use breached data …