Skip to content

Firewall Times

  • About

Michael X. Heiligenstein

Michael X. Heiligenstein is the founder and editor-in-chief of the Firewall Times . He has six years of experience in online publishing and marketing. Before founding the Firewall Times, he was Vice President of SEO at Fit Small Business, a website devoted to helping small business owners. He graduated from the University of Virginia with a degree in English and History.

Recent Data Breaches – 2023

March 17, 2023 by Michael X. Heiligenstein

Amazon Data Breaches: Full Timeline Through 2023

March 17, 2023 by Michael X. Heiligenstein

Key Management: the Ultimate Guide

March 16, 2023 by Michael X. Heiligenstein

Proprietary Data

March 2, 2023 by Michael X. Heiligenstein

Google Data Breaches: Full Timeline Through 2023

January 31, 2023 by Michael X. Heiligenstein

Top 10 Biggest Data Breaches of 2022

January 10, 2023 by Michael X. Heiligenstein

2021 Data Breaches: A Full Timeline

January 10, 2023 by Michael X. Heiligenstein

Twitter Data Breaches: Full Timeline Through 2023

January 11, 2023January 5, 2023 by Michael X. Heiligenstein

Uber Data Breaches: Full Timeline Through 2022

December 14, 2022 by Michael X. Heiligenstein

Microsoft Data Breaches: Full Timeline Through 2022

January 20, 2023November 25, 2022 by Michael X. Heiligenstein

Apple Data Breaches: Full Timeline Through 2022

October 3, 2022 by Michael X. Heiligenstein

Lapsus$ Group Cyberattacks: Methods, Motives, & Timeline

October 4, 2022September 19, 2022 by Michael X. Heiligenstein

5 Insightful Cloud Security Tips

September 8, 2022 by Michael X. Heiligenstein

TikTok Data Breaches: Full Timeline Through 2022

September 7, 2022September 6, 2022 by Michael X. Heiligenstein

Fire Suppression Systems: the Ultimate Guide

August 25, 2022 by Michael X. Heiligenstein

Mantraps: What You Need to Know

August 18, 2022 by Michael X. Heiligenstein

Authentication vs Authorization: Know the Difference

August 24, 2022August 11, 2022 by Michael X. Heiligenstein

iCloud Hacked? How to Tell (And What to Do About It)

August 2, 2022 by Michael X. Heiligenstein

Snapchat Hacked? Here’s What to Do About It

July 25, 2022 by Michael X. Heiligenstein

Amazon Web Services (AWS) Data Breaches: Full Timeline Through 2022

June 23, 2022June 22, 2022 by Michael X. Heiligenstein

SOC 2 Reports: What You Need to Know

June 6, 2022 by Michael X. Heiligenstein

SOC 1 vs SOC 2: Know the Difference

May 25, 2022 by Michael X. Heiligenstein

SOC 2 Type II Compliance: What You Need to Know

May 11, 2022 by Michael X. Heiligenstein

SOC 2 Compliance: Everything You Need to Know

May 4, 2022May 4, 2022 by Michael X. Heiligenstein

Amazon Mission Statement, Vision, and Values

April 25, 2022 by Michael X. Heiligenstein

Uber Mission Statement, Vision, and Values

April 15, 2022 by Michael X. Heiligenstein

Spear Phishing vs Phishing: Know the Difference

April 7, 2022April 7, 2022 by Michael X. Heiligenstein

6 Phishing Email Examples: How to Spot the Scam

March 31, 2022March 30, 2022 by Michael X. Heiligenstein

44 Eye-Opening Social Media Addiction Statistics

March 30, 2022March 18, 2022 by Michael X. Heiligenstein

Netflix Mission Statement, Vision, and Values

March 21, 2022January 26, 2022 by Michael X. Heiligenstein

Facebook Data Breaches: Full Timeline Through 2022

March 21, 2022January 18, 2022 by Michael X. Heiligenstein

Apple Mission Statement, Vision, and Values

March 21, 2022January 17, 2022 by Michael X. Heiligenstein

Cipher Locks: Know Before You Buy

December 2, 2021 by Michael X. Heiligenstein

Access Control: Everything You Need to Know

August 24, 2022November 22, 2021 by Michael X. Heiligenstein

The Principle of Least Privilege

August 24, 2022November 19, 2021 by Michael X. Heiligenstein

Authentication, Authorization, and Accounting: the AAA Framework

August 24, 2022November 10, 2021 by Michael X. Heiligenstein

Discretionary Access Control: How It Works

August 24, 2022November 1, 2021 by Michael X. Heiligenstein

Mandatory Access Control: How It Works

August 24, 2022October 27, 2021 by Michael X. Heiligenstein

Access Control Lists: What They Are & How They Work

August 24, 2022October 18, 2021 by Michael X. Heiligenstein

Technical Security Controls: Encryption, Firewalls & More

October 14, 2021 by Michael X. Heiligenstein

Logical Access Control: How It Works

December 9, 2022October 11, 2021 by Michael X. Heiligenstein

Biometric Access Control: What You Need to Know

August 24, 2022October 4, 2021 by Michael X. Heiligenstein

How Often Cyberattacks Happen: Key Statistics

November 19, 2021September 20, 2021 by Michael X. Heiligenstein

Types of Access Control

August 24, 2022August 9, 2021 by Michael X. Heiligenstein

Non Discretionary Access Control: Definition & More

August 24, 2022July 28, 2021 by Michael X. Heiligenstein

Physical Access Control: the Ultimate Guide

August 24, 2022July 21, 2021 by Michael X. Heiligenstein

Outdoor Perimeter Security: Layers of Defense

August 30, 2021July 21, 2021 by Michael X. Heiligenstein

Access Control Policy: What to Include

August 24, 2022July 12, 2021 by Michael X. Heiligenstein

8 Access Control Models – Strengths, Weaknesses, and More

August 24, 2022June 24, 2021 by Michael X. Heiligenstein

Rule-Based Access Controls: How They Protect Network Access

August 24, 2022June 24, 2021 by Michael X. Heiligenstein

Should Google Be Regulated? An Interview with Rand Fishkin

April 7, 2021 by Michael X. Heiligenstein

How Companies Track You Online – The Definitive Guide

April 24, 2021March 3, 2021 by Michael X. Heiligenstein

How to Protect Your Privacy Online

December 28, 2020 by Michael X. Heiligenstein

Android Privacy Settings: What to Know

December 23, 2020 by Michael X. Heiligenstein

Personally Identifiable Information (PII)

November 30, 2020 by Michael X. Heiligenstein

Whale Phishing: Everything You Need to Know

November 30, 2020November 18, 2020 by Michael X. Heiligenstein

Identity Theft: How it Works & How to Protect Yourself

November 2, 2020 by Michael X. Heiligenstein

Phishing Attacks: The Definitive Guide

August 2, 2022October 26, 2020 by Michael X. Heiligenstein

17 Ways to Identify and Prevent Phishing Attacks

October 26, 2020October 23, 2020 by Michael X. Heiligenstein

How Phishing Scams Work – And How to Protect Yourself

October 8, 2020 by Michael X. Heiligenstein

Vishing, aka Voice Phishing: How to Protect Yourself

October 7, 2020 by Michael X. Heiligenstein

Spear Phishing Attacks: What You Need to Know

September 1, 2021September 29, 2020 by Michael X. Heiligenstein

6 Spear Phishing Example Emails – Plus Tips on Staying Safe

June 28, 2021September 26, 2020 by Michael X. Heiligenstein

Smishing, aka SMS Phishing: How to Protect Yourself

September 29, 2020September 25, 2020 by Michael X. Heiligenstein

10 Types of Phishing Attacks – With Examples

September 25, 2020 by Michael X. Heiligenstein

Phishing Awareness Training: How to Protect Your Organization

September 25, 2020 by Michael X. Heiligenstein

You clicked a fake link 🤷‍♀️

March 17, 2022September 10, 2020 by Michael X. Heiligenstein

Topics

  • Access Control (18)
  • Attacks (19)
  • Breaches (24)
  • Compliance (5)
  • Cryptography (1)
  • Data (6)
  • Fraud (2)
  • Miscellaneous (2)
  • Network Security (1)
  • Phishing (15)
  • Privacy (6)
  • Resilience (6)
  • Risk Management (2)
  • Security Controls (6)
  • Statistics (11)
  • Tech (5)

Related Posts

  • Amazon Data Breaches: Full Timeline Through 2023
  • AT&T Data Breaches: Full Timeline Through 2023
  • T-Mobile Data Breaches: Full Timeline Through 2023
  • Verizon Data Breaches: Full Timeline Through 2023
  • Google Data Breaches: Full Timeline Through 2023
About

Privacy Policy

Contact
© 2023 Firewall Times • Built with GeneratePress