You can find a lot of discussions about the selling process, but you don’t find a lot of conversation of power dynamics. Background: In 2017 I sold my company to GoDaddy. I was an executive at GoDaddy for three years post-acquisition where I spen…
Critical Vulnerability Found in Motorola’s Unisoc Chips
Checkpoint Research spotted a critical vulnerability in Unisoc Tiger T700 chips in three Motorola models
Do I have to take most of my annual leave in August in Spain?
Many Spanish companies still expect their workers to take their holidays at specific times of the year, primarily in August, right in the height of summer when many hotels are fully booked. So are you forced to take your vacation in one pa…
State-Backed Hacker Believed to Be Behind Follina Attacks on EU and US
An unnamed state actor is behind a phishing campaign targeting European and local US government entities
Akamai: Protecting Life Online with Secure Internet Access
Easily deliver value-added security services to families and businesses with Akamai Secure Internet Access services for ISPs and MNOs.
10 Years Since World IPv6 Launch
A decade past World IPv6 Launch and we are well through the migration away from legacy IPv4, but still have a long way to go.
Gloucester Council IT Systems Still Not Fully Operational Six Months After Cyber-Attack
The authority said its servers were compromised on December 20 last year
The Next Generation of HTTP
The IETF just released HTTP/3, an update to HTTP that leverages new transport protocol QUIC. Learn about how the new RFCs can affect any references to HTTP.
Russian Ministry Website Reportedly Hacked
Russia’s state news agency said hackers were demanding a ransom
With Enough Brute Force You Can Accomplish Anything
A colleague used to say: Tony, you are exactly what they mean when they say “with enough brute force you can accomplish anything.” – A colleague I would laugh, but inside it would hurt. I remember thinking how it simplified, diminishe…