Megan Clairmont

Megan Clairmont

IT Security Expert
Megan Clairmont is an Information Technology expert with deep knowledge of IT security, development, and networking. With expertise in the IT industry, Megan produces content that offers practical guidance and in-depth analysis, helping her audience stay informed about the latest trends in tech. Her contributions to leading industry publications are highly regarded for their clarity, accuracy, and relevance.
Password? No, thanks, I have mobile authentication!
Editorial Password? No, thanks, I have mobile authentication!

The future might replace passwords with mobile authentication. Recently the World Wide Web Consortium (W3C) announced on 17 February this year that it launched a new standards effort in view of a different web authentication method  – “a more secure and flexible alternative to password-based log-

Steganography – what are you actually seeing/listening to?
Editorial Steganography – what are you actually seeing/listening to?

We come into contact with numerous digital files every day, but some of them might not be what they seem at first glance; designated by the term “steganography”, the practice of concealing a message in a different cover-message precedes the era of cybernetics. A sub-section of cryptography, ste

Are you convinced you deleted that cloud file?
Editorial Are you convinced you deleted that cloud file?

Part of data privacy protection consists in being able to permanently delete data when necessary. Data deletion is another form of user control over sensitive or private information that has been at one moment entrusted upon a device or a storage medium. This brings out the question of how hard it

Visual hacking – is this a hot privacy issue in the workplace?
Editorial Visual hacking – is this a hot privacy issue in the workplace?

Visual hacking, also dubbed shoulder surfing , is the act of accessing sensitive or relevant data by taking advantage of a physical position that allows the intruder to visualize another person’s device screen. Variations consist in determining the password from the most worn out keyboard key or t

2015’s (cyber) seven – the most notorious data breach examples of the year
Editorial 2015’s (cyber) seven – the most notorious data breach examples of the year

This year has seen some major cyber-security breach cases that brought to the general attention the fact that nobody is generically safe. From private companies to government agencies, cyber-attacks threaten all entities that handle sensitive data. Taking into consideration the cyber-data black

Should encryption be limited or encouraged?
Editorial Should encryption be limited or encouraged?

The encryption debate reads the following way: while the logic of cyber-security and its encryption tools forecasts an impenetrable encryption, the government is worried that such an efficient cyber feature would block the law enforcers. Although creating a relative paradox, the diverging opinions

The EMV card and how to be almost safe
Editorial The EMV card and how to be almost safe

The EMV card comes with enhanced security features, but also with particular vulnerabilities. Since this type of credit cards has been utilized for a while in Europe and in other regions of the globe, the cyber-attackers have already developed various methods of bypassing the security features in

Five Biggest Data Breach Cases of the Last Decade
Editorial Five Biggest Data Breach Cases of the Last Decade

The OPM data breach the U.S. government announced on June 4th qualifies as a 15 on a scale from one to 10, by the loss of credit card numbers and names. Initial estimate approximated 4.2 million affected people, a number later changed to 18 million. Recently the number of affected people increased

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later