Thursday, July 9
Women in Payments: Q&A with Diane Rogerson
Cyber Security

Women in Payments: Q&A with Diane Rogerson

Diane Rogerson didn’t choose a career in cybersecurity; rather, it chose her. In this month’s blog series, find out how Rogerson’s transferrable skillsets were more valuable than her subject matter expertise around cybersecurity, and how she thinks other women can be successful in this regard, too.   (more…)
Education

Parenting Styles & Personalities

Parenting is hard.  We all know there is no How To manual, in fact, most of us simply parent the way we were parented. As educators who work with our students’ parents (or as parents ourselves) it is beneficial to learn about the different styles and personalities of parents so we can better understand those with whom we work and can communicate with them effectively. In the 60’s, clinical and developmental psychologist Dr. Diana Baumrind conducted groundbreaking research on parenting styles, identifying four different types:   Authoritarian Permissive Uninvolved Authoritative  Since Baumrind’s research, parenting has evolved and two additional styles have emerged: Snowplow Parenting and Helicopter Parenting. As the names imply, Snowplow Parenting ensures nothing is in our children’s way,...
Remote workers aren’t taking security seriously. Now that has to change
Cyber Security

Remote workers aren’t taking security seriously. Now that has to change

IT teams can help mitigate the risks of shadow IT by being more flexible and adapting to the needs of remote workers, according to a new study. UK businesses must tackle the dangers posed by 'shadow IT' as coronavirus restrictions are lifted and offices begin to reopen their doors again. Remote working has led to a heavy reliance on productivity software and other forms of collaboration tools to keep businesses running amid COVID-19. However, organizations have also lost oversight on the apps and services being used by employees to conduct business, raising a variety of fresh cybersecurity concerns for IT teams.SEE: Shadow IT policy (TechRepubl...
Paul’s Security Weekly: New Web Technology & Impact on Automated Security Testing
Cyber Security

Paul’s Security Weekly: New Web Technology & Impact on Automated Security Testing

Our core security researcher, Benjamin Daniel Mussler, has been invited to Paul’s Security Weekly podcast to participate in a discussion about new web technologies and their impact on automated security testing. Benjamin primarily talked about the fact that web browsers have gone a long way since serving static pages and web applications are becoming more and more like desktop applications. This means that the web browser is taking on the role of an operating system. The biggest challenges related to this are: Browsers will gain more and more access to the underlying operating system without user confirmation (for example, direct file system access). Therefore, web vulnerabilities may have even more serious implications on the client side. Security professionals must find ways to ...
Women in Payments: Q&A with Julie Quandt
Cyber Security

Women in Payments: Q&A with Julie Quandt

Julie Quandt used to be the only woman in the room at her corporate meetings. In this month’s Women in Payments blog series, find out why that’s changing and why the good old days of not having to wait in line for the ladies’ room at industry conferences may now be over. (more…)
Women in Payments: Q&A with Diane Rogerson
Cyber Security

Women in Payments: Q&A with Diane Rogerson

Diane Rogerson didn’t choose a career in cybersecurity; rather, it chose her. In this month’s blog series, find out how Rogerson’s transferrable skillsets were more valuable than her subject matter expertise around cybersecurity, and how she thinks other women can be successful in this regard, too.   (more…)
Parenting Styles & Personalities
Education

Parenting Styles & Personalities

Parenting is hard.  We all know there is no How To manual, in fact, most of us simply parent the way we were parented. As educators who work with our students’ parents (or as parents ourselves) it is beneficial to learn about the different styles and personalities of parents so we can better understand those with whom we work and can communicate with them effectively. In the 60’s, clinical and developmental psychologist Dr. Diana Baumrind conducted groundbreaking research on parenting styles, identifying four different types:   Authoritarian Permissive Uninvolved Authoritative  Since Baumrind’s research, parenting has evolved and two additional styles have emerged: Snowplow Parenting and Helicopter Parenting. As the names imply, Snowplow Parenting ensures nothing is in our children’s way,...
Remote workers aren’t taking security seriously. Now that has to change
Cyber Security

Remote workers aren’t taking security seriously. Now that has to change

IT teams can help mitigate the risks of shadow IT by being more flexible and adapting to the needs of remote workers, according to a new study. UK businesses must tackle the dangers posed by 'shadow IT' as coronavirus restrictions are lifted and offices begin to reopen their doors again. Remote working has led to a heavy reliance on productivity software and other forms of collaboration tools to keep businesses running amid COVID-19. However, organizations have also lost oversight on the apps and services being used by employees to conduct business, raising a variety of fresh cybersecurity concerns for IT teams.SEE: Shadow IT policy (TechRepubl...
Paul’s Security Weekly: New Web Technology & Impact on Automated Security Testing
Cyber Security

Paul’s Security Weekly: New Web Technology & Impact on Automated Security Testing

Our core security researcher, Benjamin Daniel Mussler, has been invited to Paul’s Security Weekly podcast to participate in a discussion about new web technologies and their impact on automated security testing. Benjamin primarily talked about the fact that web browsers have gone a long way since serving static pages and web applications are becoming more and more like desktop applications. This means that the web browser is taking on the role of an operating system. The biggest challenges related to this are: Browsers will gain more and more access to the underlying operating system without user confirmation (for example, direct file system access). Therefore, web vulnerabilities may have even more serious implications on the client side. Security professionals must find ways to ...
Women in Payments: Q&A with Julie Quandt
Cyber Security

Women in Payments: Q&A with Julie Quandt

Julie Quandt used to be the only woman in the room at her corporate meetings. In this month’s Women in Payments blog series, find out why that’s changing and why the good old days of not having to wait in line for the ladies’ room at industry conferences may now be over. (more…)