Cyber for Travel

8 Free or Cheap Cybersecurity Tips for Travelers
Ready to travel? Let’s talk about how you should prepare for vacation and what steps you can take to protect yourself from cyber criminals.
More posts from Jaime Contreras, MBA, CISM, CISA
View posts
Zero Trust
Jaime Contreras, MBA, CISM, CISA · 7 machine identity management best practices · Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment. · https://www.csoonline.com/article/3661357/7-machine-identity-best-practices.html#tk.rss_all

CISOs & Risk Management
Jaime Contreras, MBA, CISM, CISA · 10 NFT and cryptocurrency security risks that CISOs must navigate · Decentralized technologies may raise CISOs anxiety levels, but there are ways to ward off security risks. · https://www.csoonline.com/article/3655745/10-security-concerns-cisos-should-have-about-nfts-and-cryptocu ...

Medical Device Vulnerabilities
Jaime Contreras, MBA, CISM, CISA · Critical Bugs Expose Hundreds of Thousands of Medical Devices and ATMs · The so-called Access:7 vulnerabilities are the latest high-profile IoT security fumble. · https://www.wired.com/story/access7-iot-vulnerabilities-medical-devices-atms/
Related professionals
You may be interested in these jobs
-
Senior Cyber Range Event Designer
1 week ago
Adapt Forward North CharlestonAs a Cyber Event Designer you will define and lead innovative solutions for engineering DoD cyber test environments to support Developmental Test & Evaluation Operational Test & Evaluation and Research Evaluations as well as for Cyber Mission Forces CMF training across all branch ...
-
Cyber Engineer Principal
1 month ago
Jobs via Dice Broomfield, COWe are seeking a highly skilled and experienced Lead Cyber Engineer to oversee a dynamic team of engineers and subject matter experts specializing in Risk Management Framework (RMF), Cryptography (Crypto), Program Protection, Certificate to Field (CtF), and Authority to Operate ( ...
-
Cyber Event Designer
1 month ago
Command Post Technologies, Inc. Naval Air Station Patuxent River, MDCommand Post Technologies (CPT) is seeking an experienced and driven Senior Cyber Event Designer to join our team supporting the National Cyber Range Complex (NCRC) at Pax River. · ...
Comments
Zacharias 🐝 Voulgaris
3 years ago#1
Cool advice. I'd add that if you find yourself in an airport or any busy hub where hackers may be lurking, it's good to keep all your sensitive devices and RFID documents in a Faraday bag (kind of a Faraday cage, but in sealable bag form). This can prevent them from accessing them wirelessly. Cheers