L E A N M A D E
  • HOME
  • CUSTOMER REFERENCES
    • BLOG
    • OUR GTC’s
  • ABOUT
    • ABOUT US
    • BLOG
    • CONTACT
      • CONTACT FORM
  • German
Select Page
Your LEANmade Digest No. 96: rise in remote MacOS workers, paying ransoms to sanctioned hackers, cybersecurity risks in M&A and profitable ethics and compliance programs

Your LEANmade Digest No. 96: rise in remote MacOS workers, paying ransoms to sanctioned hackers, cybersecurity risks in M&A and profitable ethics and compliance programs

Feb 4, 2021

Rise in Remote MacOS Workers Driving Cybersecurity ‘Rethink’ (Dark Reading) ‘”When this settles out, a large group of users are not coming back to the office ever,” he says. “What we have to think in terms of is hardened users and...
Your LEANmade Digest No. 94: FBI and CISA warn of vishing attacks (not a typo), Gartner’s Hype Cycle for Emerging Technologies, and the pandemic has changed the future of cybersecurity.

Your LEANmade Digest No. 94: FBI and CISA warn of vishing attacks (not a typo), Gartner’s Hype Cycle for Emerging Technologies, and the pandemic has changed the future of cybersecurity.

Sep 2, 2020 | 0 comments

(Not a typo:) FBI and CISA warn of major wave of vishing attacks (ZDNet) ‘Vishing, or voice phishing, is a form of social engineering where criminals call victims to obtain desired information, usually posing as other persons.’ ‘Hackers are calling...
Your LEANmade Digest No. 92: the Hunt for the Kremlin’s Most Dangerous Hackers, a Data Breach at a Genealogy Site, and the Privacy Paradox.

Your LEANmade Digest No. 92: the Hunt for the Kremlin’s Most Dangerous Hackers, a Data Breach at a Genealogy Site, and the Privacy Paradox.

Aug 6, 2020 | 0 comments

  Sandworm details the group behind the worst cyberattacks in history (The Verge)’Verge editor-in-chief Nilay Patel talks with Wired senior editor Andy Greenberg, author of Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers.As...
Your LEANmade Digest No. 86: 14 real-world phishing examples, proximity tracing apps don’t have to kill privacy to be effective and a cautionary perspective on the effectiveness of (some) hackathons.

Your LEANmade Digest No. 86: 14 real-world phishing examples, proximity tracing apps don’t have to kill privacy to be effective and a cautionary perspective on the effectiveness of (some) hackathons.

Jun 10, 2020 | 0 comments

 Coronavirus tracing apps don’t have to kill privacy to be effective (Wired.co.uk)One project trying to answer such questions is Decentralised Privacy-Preserving Proximity Tracing (DP3T), which proposes a decentralised system that uses temporary identification...
Your LEANmade Digest No. 85: Looking at the bigger picture: 9 Future Predictions, Stakeholder capitalism, and Faking AI ?

Your LEANmade Digest No. 85: Looking at the bigger picture: 9 Future Predictions, Stakeholder capitalism, and Faking AI ?

Apr 5, 2020 | 0 comments

 . 9 Future Predictions For A Post-Coronavirus World (Forbes) ‘As the ripple of COVID-19 careens around the globe, it’s forcing humankind to innovate and change the way we work and live. The upside of where we find ourselves right now is that individuals and...
Your LEANmade Digest No. 82: Leading in the Digital Era, a Decade in Data, and 4 Ethical Concerns in a Connected World

Your LEANmade Digest No. 82: Leading in the Digital Era, a Decade in Data, and 4 Ethical Concerns in a Connected World

Mar 9, 2020 | 0 comments

 .Leading In The Digital Era — Two Most Needed ChangesPutting the 4th Industrial Revolution in a historic persepctive: ‘We are back in the village, except that the village is global and 24/7 connected!’ Rajeev Peshawaria via Forbes.com..Decade in...
« Older Entries
Next Entries »

Search

Recent Posts

  • Your LEANmade Digest No. 112 – Cyber breach: Unauthorized transactions approved without users’ 2FA authentication
  • Your LEANmade Digest No. 110 – Your DNA will soon be on file, if it’s not already. What will the consequences be?
  • Your LEANmade Digest No. 111 – The Rising Consumer Demand for Data Privacy and Autonomy
  • Your LEANmade Digest No. 106 – What happens when our faces are tracked everywhere, A.I.’s most important dataset gets a privacy overhaul, and how to secure data privacy in genomics research
  • Your LEANmade Digest No. 104: Why Trust has become the most important Asset, and Digital Identity as critical national Infrastructure

Archives

Categories

  • TERMS OF USE
  • DATA PROTECTION DECLARATION