Megan Clairmont

Megan Clairmont

IT Security Expert
Megan Clairmont is an Information Technology expert with deep knowledge of IT security, development, and networking. With expertise in the IT industry, Megan produces content that offers practical guidance and in-depth analysis, helping her audience stay informed about the latest trends in tech. Her contributions to leading industry publications are highly regarded for their clarity, accuracy, and relevance.
How risky is macro malware, after all?
Editorial How risky is macro malware, after all?

Macro in computing represents a set of rules or patterns that match a certain input sequence to a specific output sequence, thus serving in automating software functions. They are essentially time-saving ways of launching repetitive tasks, and many organizations need to employ macros on a daily

Don’t become a social engineering victim – know your Facebook
Editorial Don’t become a social engineering victim – know your Facebook

Managing a personal Facebook account takes a few efforts in order to efficiently protect the individual privacy, since the default settings allow any stranger to find out quite a few details on the account owner: date of birth, location, interests, and friends are the most exposed by default

Find out the basics on the most famous mobile payment systems
Editorial Find out the basics on the most famous mobile payment systems

While a recent report coming from the Institute of Electrical and Electronics Engineers shows that according to nearly 1400 tech enthusiasts (out of 2000 surveyed) mobile payment is sure to take over the payment market and clearly will surpass cash and credit cards by the year 2030, other online

Is homomorphic encryption the ultimate in cloud security?
Editorial Is homomorphic encryption the ultimate in cloud security?

The simplest way to describe homomorphic encryption would be the following: HE is the particular type of converting data into cipher text that allows this encrypted data to further get analyzed, permuted, associated to, and generally used into various computations without any decryption involved.

What do you know on language-theoretic security?
Editorial What do you know on language-theoretic security?

Language-theoretic security or LangSec is a cyber-security approach that aims at eliminating cyber-risks from their programming roots. From this new perspective, all Internet cyber-risks originate in ad-hoc programming and untrusted inputs that form layer upon layer of coding with potential

Have you considered improving your IR strategy?
Editorial Have you considered improving your IR strategy?

The Incident Response procedure (or IR strategy) is part of the cyber-security control measures. Following prevention and detection, the IR strategy is critical for the situations where the system has been affected by a breach or by another cyber-security event. A coherent IR plan should comprise

Password? No, thanks, I have mobile authentication!
Editorial Password? No, thanks, I have mobile authentication!

The future might replace passwords with mobile authentication. Recently the World Wide Web Consortium (W3C) announced on 17 February this year that it launched a new standards effort in view of a different web authentication method  – “a more secure and flexible alternative to password-based log-

Steganography – what are you actually seeing/listening to?
Editorial Steganography – what are you actually seeing/listening to?

We come into contact with numerous digital files every day, but some of them might not be what they seem at first glance; designated by the term “steganography”, the practice of concealing a message in a different cover-message precedes the era of cybernetics. A sub-section of cryptography, ste

Are you convinced you deleted that cloud file?
Editorial Are you convinced you deleted that cloud file?

Part of data privacy protection consists in being able to permanently delete data when necessary. Data deletion is another form of user control over sensitive or private information that has been at one moment entrusted upon a device or a storage medium. This brings out the question of how hard it

Visual hacking – is this a hot privacy issue in the workplace?
Editorial Visual hacking – is this a hot privacy issue in the workplace?

Visual hacking, also dubbed shoulder surfing , is the act of accessing sensitive or relevant data by taking advantage of a physical position that allows the intruder to visualize another person’s device screen. Variations consist in determining the password from the most worn out keyboard key or t

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later