Skip to content

Firewall Times

  • About

Michael X. Heiligenstein

Michael X. Heiligenstein is the founder and editor-in-chief of the Firewall Times . He has six years of experience in online publishing and marketing. Before founding the Firewall Times, he was Vice President of SEO at Fit Small Business, a website devoted to helping small business owners. He graduated from the University of Virginia with a degree in English and History.

PCI Penetration Testing: What You Need to Know

May 25, 2023 by Michael X. Heiligenstein

Black Box Penetration Testing: How It Works

May 22, 2023 by Michael X. Heiligenstein

White Box Penetration Testing: How It Works

May 18, 2023 by Michael X. Heiligenstein

ChatGPT Data Breaches: Full Timeline Through 2023

May 18, 2023 by Michael X. Heiligenstein

Recent Data Breaches – 2023

May 18, 2023May 17, 2023 by Michael X. Heiligenstein

Facebook Data Breaches: Full Timeline Through 2023

May 16, 2023May 10, 2023 by Michael X. Heiligenstein

Uber Data Breaches: Full Timeline Through 2023

April 7, 2023 by Michael X. Heiligenstein

TikTok Data Breaches: Full Timeline Through 2023

April 7, 2023 by Michael X. Heiligenstein

Apple Data Breaches: Full Timeline Through 2023

April 6, 2023 by Michael X. Heiligenstein

Amazon Web Services (AWS) Data Breaches: Full Timeline Through 2023

April 6, 2023 by Michael X. Heiligenstein

Microsoft Data Breaches: Full Timeline Through 2023

April 10, 2023April 6, 2023 by Michael X. Heiligenstein

Amazon Data Breaches: Full Timeline Through 2023

March 27, 2023March 17, 2023 by Michael X. Heiligenstein

Key Management: the Ultimate Guide

March 27, 2023March 16, 2023 by Michael X. Heiligenstein

Proprietary Data

March 27, 2023March 2, 2023 by Michael X. Heiligenstein

Google Data Breaches: Full Timeline Through 2023

March 27, 2023January 31, 2023 by Michael X. Heiligenstein

Top 10 Biggest Data Breaches of 2022

March 27, 2023January 10, 2023 by Michael X. Heiligenstein

2021 Data Breaches: A Full Timeline

March 27, 2023January 10, 2023 by Michael X. Heiligenstein

Twitter Data Breaches: Full Timeline Through 2023

March 27, 2023January 5, 2023 by Michael X. Heiligenstein

Lapsus$ Group Cyberattacks: Methods, Motives, & Timeline

March 27, 2023September 19, 2022 by Michael X. Heiligenstein

5 Insightful Cloud Security Tips

March 27, 2023September 8, 2022 by Michael X. Heiligenstein

Fire Suppression Systems: the Ultimate Guide

March 27, 2023August 25, 2022 by Michael X. Heiligenstein

Mantraps: What You Need to Know

March 27, 2023August 18, 2022 by Michael X. Heiligenstein

Authentication vs Authorization: Know the Difference

March 27, 2023August 11, 2022 by Michael X. Heiligenstein

iCloud Hacked? How to Tell (And What to Do About It)

March 27, 2023August 2, 2022 by Michael X. Heiligenstein

Snapchat Hacked? Here’s What to Do About It

March 27, 2023July 25, 2022 by Michael X. Heiligenstein

SOC 2 Reports: What You Need to Know

March 27, 2023June 6, 2022 by Michael X. Heiligenstein

SOC 1 vs SOC 2: Know the Difference

March 27, 2023May 25, 2022 by Michael X. Heiligenstein

SOC 2 Type II Compliance: What You Need to Know

March 27, 2023May 11, 2022 by Michael X. Heiligenstein

SOC 2 Compliance: Everything You Need to Know

April 21, 2023May 4, 2022 by Michael X. Heiligenstein

Amazon Mission Statement, Vision, and Values

March 27, 2023April 25, 2022 by Michael X. Heiligenstein

Uber Mission Statement, Vision, and Values

March 27, 2023April 15, 2022 by Michael X. Heiligenstein

Spear Phishing vs Phishing: Know the Difference

March 27, 2023April 7, 2022 by Michael X. Heiligenstein

6 Phishing Email Examples: How to Spot the Scam

March 27, 2023March 30, 2022 by Michael X. Heiligenstein

44 Eye-Opening Social Media Addiction Statistics

March 27, 2023March 18, 2022 by Michael X. Heiligenstein

Netflix Mission Statement, Vision, and Values

March 27, 2023January 26, 2022 by Michael X. Heiligenstein

Apple Mission Statement, Vision, and Values

March 27, 2023January 17, 2022 by Michael X. Heiligenstein

Cipher Locks: Know Before You Buy

March 27, 2023December 2, 2021 by Michael X. Heiligenstein

Access Control: Everything You Need to Know

March 27, 2023November 22, 2021 by Michael X. Heiligenstein

The Principle of Least Privilege

March 27, 2023November 19, 2021 by Michael X. Heiligenstein

Authentication, Authorization, and Accounting: the AAA Framework

March 27, 2023November 10, 2021 by Michael X. Heiligenstein

Discretionary Access Control: How It Works

March 27, 2023November 1, 2021 by Michael X. Heiligenstein

Mandatory Access Control: How It Works

March 27, 2023October 27, 2021 by Michael X. Heiligenstein

Access Control Lists: What They Are & How They Work

March 27, 2023October 18, 2021 by Michael X. Heiligenstein

Technical Security Controls: Encryption, Firewalls & More

March 27, 2023October 14, 2021 by Michael X. Heiligenstein

Logical Access Control: How It Works

March 27, 2023October 11, 2021 by Michael X. Heiligenstein

Biometric Access Control: What You Need to Know

March 27, 2023October 4, 2021 by Michael X. Heiligenstein

How Often Cyberattacks Happen: Key Statistics

March 27, 2023September 20, 2021 by Michael X. Heiligenstein

Types of Access Control

March 27, 2023August 9, 2021 by Michael X. Heiligenstein

Non Discretionary Access Control: Definition & More

March 27, 2023July 28, 2021 by Michael X. Heiligenstein

Physical Access Control: the Ultimate Guide

March 27, 2023July 21, 2021 by Michael X. Heiligenstein

Outdoor Perimeter Security: Layers of Defense

March 27, 2023July 21, 2021 by Michael X. Heiligenstein

Access Control Policy: What to Include

March 27, 2023July 12, 2021 by Michael X. Heiligenstein

8 Access Control Models – Strengths, Weaknesses, and More

March 27, 2023June 24, 2021 by Michael X. Heiligenstein

Rule-Based Access Controls: How They Protect Network Access

March 27, 2023June 24, 2021 by Michael X. Heiligenstein

Should Google Be Regulated? An Interview with Rand Fishkin

March 27, 2023April 7, 2021 by Michael X. Heiligenstein

How Companies Track You Online – The Definitive Guide

March 27, 2023March 3, 2021 by Michael X. Heiligenstein

How to Protect Your Privacy Online

March 27, 2023December 28, 2020 by Michael X. Heiligenstein

Android Privacy Settings: What to Know

March 27, 2023December 23, 2020 by Michael X. Heiligenstein

Personally Identifiable Information (PII)

March 27, 2023November 30, 2020 by Michael X. Heiligenstein

Whale Phishing: Everything You Need to Know

March 27, 2023November 18, 2020 by Michael X. Heiligenstein

Identity Theft: How it Works & How to Protect Yourself

April 12, 2023November 2, 2020 by Michael X. Heiligenstein

Phishing Attacks: The Definitive Guide

March 27, 2023October 26, 2020 by Michael X. Heiligenstein

17 Ways to Identify and Prevent Phishing Attacks

March 27, 2023October 23, 2020 by Michael X. Heiligenstein

How Phishing Scams Work – And How to Protect Yourself

March 27, 2023October 8, 2020 by Michael X. Heiligenstein

Vishing, aka Voice Phishing: How to Protect Yourself

March 27, 2023October 7, 2020 by Michael X. Heiligenstein

Spear Phishing Attacks: What You Need to Know

March 27, 2023September 29, 2020 by Michael X. Heiligenstein

6 Spear Phishing Example Emails – Plus Tips on Staying Safe

March 27, 2023September 26, 2020 by Michael X. Heiligenstein

Smishing, aka SMS Phishing: How to Protect Yourself

March 27, 2023September 25, 2020 by Michael X. Heiligenstein

10 Types of Phishing Attacks – With Examples

March 27, 2023September 25, 2020 by Michael X. Heiligenstein

Phishing Awareness Training: How to Protect Your Organization

March 27, 2023September 25, 2020 by Michael X. Heiligenstein

You clicked a fake link 🤷‍♀️

March 27, 2023September 10, 2020 by Michael X. Heiligenstein

Topics

  • Access Control (18)
  • Attacks (20)
  • Breaches (27)
  • Compliance (5)
  • Cryptography (1)
  • Data (6)
  • IT (1)
  • Miscellaneous (2)
  • Network Security (3)
  • Penetration Testing (3)
  • Phishing (15)
  • Privacy (8)
  • Resilience (6)
  • Risk Management (2)
  • Security Controls (6)
  • Statistics (12)
  • Tech (5)

Related Posts

  • Black Box Penetration Testing: How It Works
  • White Box Penetration Testing: How It Works
About

Privacy Policy

Contact
© 2023 Firewall Times • Built with GeneratePress