author-image

Marc Dahan

Marc is a technology journalist with over 15 years experience. He specializes in content related to emerging technologies, cybersecurity, big data, privacy, artificial intelligence, and the politics of technology. He has worked for some of the largest tech companies, such as Deluxe Digital, Sony and Autodesk. During his time at Autodesk, he gave a series of talks on digital security and privacy, designed to give people the means to secure various aspects of their digital lives. Marc is passionate about online privacy and digital freedom.

Articles by Marc

Masquerade attacks can be difficult to detect because the attackers use valid credentials. This post takes looks at how masquerade attacks work and provides tips on how to defend against them.
By Marc Dahan in Information Security on December 21, 2023
Software vulnerabilities are quite common but if even one of them turns out to be a zero-day, the damage could be massive. We look at what zero-day exploits are and what you can do about them.
By Marc Dahan in Information Security on June 27, 2023
Shadow IT is a unique vulnerability insofar as it's largely unintentional. In this article we look at what shadow IT is, what its risks are and how to mitigiate them.
By Marc Dahan in Information Security on February 8, 2024
In this post we take a deep dive into Apple's proposed client-side CSAM scanning to find out what all the fuss is about.
By Marc Dahan in Information Security on December 15, 2021
Path traversal attacks may not get as much attention as other online attacks but they can be quite nasty. In this post, we look at how path traversal attacks work and how to prevent them.
By Marc Dahan in Information Security on November 15, 2023
Why would you want to keep your VPN enabled all the time? There are actually some compelling reasons to do this. We look at the pros and cons of an always-on VPN.
By Marc Dahan in VPN & Privacy on February 8, 2023
Watering hole attacks can be devastating to organizations - and they're quite common. In this post we explain what watering hole attacks are and how you can avoid them.
By Marc Dahan in Information Security on January 25, 2024
SSTP is a proprietary VPN protocol, developed by Microsoft. In this post, we explain how SSTP works and show you how to create a connection in Windows and Linux.
By Marc Dahan in VPN & Privacy on September 19, 2023
Web cache poisoning attacks can put your web site/application at risk, as well as your users. In this post, we look at how web cache poisoning attacks work and what you can do to prevent them.
By Marc Dahan in Information Security on December 21, 2023
Page 11 of 14