All posts on markn.ca covering cloud, security, privacy, and technology.
Who did it? It’s a powerful question and the answer to “What is attack attribution?”
Authentication and authorization are two critical concepts that are intertwined. Understanding the difference and their purpose is key to understanding cybersecurity.
Hackers and cybercriminals are all “malicious actors”. While you may not know who is attacking a system, having a better understanding of common motivations is important.
Malicious software (malware) is an umbrella term that covers a number of different types of software designed to do bad things…but those specific categories don’t mean to much day-to-day when it comes to defence…
Encryption: what is it? why does it work?
VPNs can help secure your internet traffic when you’re travelling. They can help you route around geographic restrictions. But is using a VPN exposing you to more risk? What is the impact of centralizing all of your internet requests with one s...
Perspective is a tricky thing….maybe the hardest aspect of cybersecurity
What is a password? Why do we use them? Why are they so frustrating? …some answers
Continuing the “basics” series, here’s an easy way to understand the terms: vulnerability, exploit, threat, and risk
The basics starts with understanding the goal of security. It sounds simple but the goal is to make sure whatever you build works as you intend…and only as you intend!
Back from vacation, I recap the show’s structure and new channels as well as the plan around “the basics”
GMail in the classroom just like on your phone. The promise of G Suite for Education is enticing. A low-cost way for schools to provide collaboration tools to students and teachers. But what are the privacy implications of letting the search giant in...