Megan Clairmont

Megan Clairmont

IT Security Expert
Megan Clairmont is an Information Technology expert with deep knowledge of IT security, development, and networking. With expertise in the IT industry, Megan produces content that offers practical guidance and in-depth analysis, helping her audience stay informed about the latest trends in tech. Her contributions to leading industry publications are highly regarded for their clarity, accuracy, and relevance.
Data Brokers and why is privacy protection valuable
Editorial Data Brokers and why is privacy protection valuable

During a recent conversation I was surprised to find out that not all people understand the value of privacy protection. Unless confronted with the perspective of their data ending up in malicious hands, of course. However, when talking about privacy rights and their importance in the online

How does digital security differ from cyber-security?
Editorial How does digital security differ from cyber-security?

Slowly, but firmly, digital security replaces cyber-security. Some may experience surprise or confusion. More articles, more companies’ resources and presentations use the new term instead of the traditional one. What is going on? How does digital security differ from cyber-security? Most i

Cyber Defence 2017 – what to expect?
Editorial Cyber Defence 2017 – what to expect?

The next year is not so far now. Cyber Defence 2017 is shaping up. By this we mean all cyber-security lines of defence, research-level and company-level. What will the trends be and how will they unfold? Although surprises are not excluded (see the recent Dyn attack), some have started to release

What do you know on fuzz testing?
Editorial What do you know on fuzz testing?

Cyber-security nowadays is getting more and more competitive, and it certainly is a battlefield where companies can suffer losses of huge proportions when hit. Even zero day exploits can cost vast amounts of money if not remedied in time, and that is just one of the effects. Damaged reputation also

How risky is macro malware, after all?
Editorial How risky is macro malware, after all?

Macro in computing represents a set of rules or patterns that match a certain input sequence to a specific output sequence, thus serving in automating software functions. They are essentially time-saving ways of launching repetitive tasks, and many organizations need to employ macros on a daily

Don’t become a social engineering victim – know your Facebook
Editorial Don’t become a social engineering victim – know your Facebook

Managing a personal Facebook account takes a few efforts in order to efficiently protect the individual privacy, since the default settings allow any stranger to find out quite a few details on the account owner: date of birth, location, interests, and friends are the most exposed by default

Find out the basics on the most famous mobile payment systems
Editorial Find out the basics on the most famous mobile payment systems

While a recent report coming from the Institute of Electrical and Electronics Engineers shows that according to nearly 1400 tech enthusiasts (out of 2000 surveyed) mobile payment is sure to take over the payment market and clearly will surpass cash and credit cards by the year 2030, other online

Is homomorphic encryption the ultimate in cloud security?
Editorial Is homomorphic encryption the ultimate in cloud security?

The simplest way to describe homomorphic encryption would be the following: HE is the particular type of converting data into cipher text that allows this encrypted data to further get analyzed, permuted, associated to, and generally used into various computations without any decryption involved.

What do you know on language-theoretic security?
Editorial What do you know on language-theoretic security?

Language-theoretic security or LangSec is a cyber-security approach that aims at eliminating cyber-risks from their programming roots. From this new perspective, all Internet cyber-risks originate in ad-hoc programming and untrusted inputs that form layer upon layer of coding with potential

Have you considered improving your IR strategy?
Editorial Have you considered improving your IR strategy?

The Incident Response procedure (or IR strategy) is part of the cyber-security control measures. Following prevention and detection, the IR strategy is critical for the situations where the system has been affected by a breach or by another cyber-security event. A coherent IR plan should comprise

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later