Skip to content

Firewall Times

  • About

Michael X. Heiligenstein

Michael X. Heiligenstein is the founder and managing editor of The Firewall Times. He has six years of experience in online publishing and marketing. Before founding the Firewall Times, he was Vice President of SEO at Fit Small Business, a website devoted to helping small business owners. He graduated from the University of Virginia with a degree in English and History.

The Most Recent Data Breaches – June 2022

June 24, 2022June 22, 2022 by Michael X. Heiligenstein

Amazon Web Services (AWS) Data Breaches: Full Timeline Through 2022

June 23, 2022June 22, 2022 by Michael X. Heiligenstein

Amazon Data Breaches: Full Timeline Through 2022

June 22, 2022June 22, 2022 by Michael X. Heiligenstein

SOC 2 Reports: What You Need to Know

June 6, 2022 by Michael X. Heiligenstein

SOC 1 vs SOC 2: Know the Difference

May 25, 2022 by Michael X. Heiligenstein

SOC 2 Type II Compliance: What You Need to Know

May 11, 2022 by Michael X. Heiligenstein

SOC 2 Compliance: Everything You Need to Know

May 4, 2022May 4, 2022 by Michael X. Heiligenstein

Amazon Mission Statement, Vision, and Values

April 25, 2022 by Michael X. Heiligenstein

Uber Mission Statement, Vision, and Values

April 15, 2022 by Michael X. Heiligenstein

Spear Phishing vs Phishing: Know the Difference

April 7, 2022April 7, 2022 by Michael X. Heiligenstein

6 Phishing Email Examples: How to Spot the Scam

March 31, 2022March 30, 2022 by Michael X. Heiligenstein

Microsoft Data Breaches: Full Timeline Through 2022

March 23, 2022 by Michael X. Heiligenstein

Lapsus$ Group Cyberattacks: Methods, Motives, & Timeline

March 23, 2022March 22, 2022 by Michael X. Heiligenstein

44 Eye-Opening Social Media Addiction Statistics

March 30, 2022March 18, 2022 by Michael X. Heiligenstein

Alphabet Revenue: $258 Billion in 2021

March 14, 2022 by Michael X. Heiligenstein

Amazon Revenue: $470 Billion in 2021

March 14, 2022 by Michael X. Heiligenstein

Meta (formerly Facebook) Revenue: $117.9 Billion in 2021

March 11, 2022 by Michael X. Heiligenstein

Apple Revenue: $366 Billion in 2021

March 11, 2022 by Michael X. Heiligenstein

Netflix Mission Statement, Vision, and Values

March 21, 2022January 26, 2022 by Michael X. Heiligenstein

Facebook Data Breaches: Full Timeline Through 2022

March 21, 2022January 18, 2022 by Michael X. Heiligenstein

Google Data Breaches: Full Timeline Through 2022

March 21, 2022January 18, 2022 by Michael X. Heiligenstein

Apple Data Breaches: Full Timeline Through 2022

March 21, 2022January 17, 2022 by Michael X. Heiligenstein

Apple Mission Statement, Vision, and Values

March 21, 2022January 17, 2022 by Michael X. Heiligenstein

RTO and RPO: Understand the Difference

December 20, 2021 by Michael X. Heiligenstein

Cipher Locks: Know Before You Buy

December 2, 2021 by Michael X. Heiligenstein

Access Control: Everything You Need to Know

November 22, 2021 by Michael X. Heiligenstein

The Principle of Least Privilege

November 19, 2021 by Michael X. Heiligenstein

Authentication, Authorization, and Accounting: the AAA Framework

November 10, 2021 by Michael X. Heiligenstein

Discretionary Access Control: How It Works

November 18, 2021November 1, 2021 by Michael X. Heiligenstein

Mandatory Access Control: How It Works

October 27, 2021 by Michael X. Heiligenstein

Access Control Lists: What They Are & How They Work

November 18, 2021October 18, 2021 by Michael X. Heiligenstein

Technical Security Controls: Encryption, Firewalls & More

October 14, 2021 by Michael X. Heiligenstein

Logical Access Control: How It Works

November 10, 2021October 11, 2021 by Michael X. Heiligenstein

Biometric Access Control: What You Need to Know

October 4, 2021 by Michael X. Heiligenstein

How Often Cyberattacks Happen: Key Statistics

November 19, 2021September 20, 2021 by Michael X. Heiligenstein

Types of Access Control

August 9, 2021 by Michael X. Heiligenstein

Non Discretionary Access Control: Definition & More

June 30, 2022July 28, 2021 by Michael X. Heiligenstein

Physical Access Control: the Ultimate Guide

August 30, 2021July 21, 2021 by Michael X. Heiligenstein

Outdoor Perimeter Security: Layers of Defense

August 30, 2021July 21, 2021 by Michael X. Heiligenstein

Access Control Policy: What to Include

March 22, 2022July 12, 2021 by Michael X. Heiligenstein

8 Access Control Models – Strengths, Weaknesses, and More

October 4, 2021June 24, 2021 by Michael X. Heiligenstein

Rule-Based Access Controls: How They Protect Network Access

June 24, 2021 by Michael X. Heiligenstein

Should Google Be Regulated? An Interview with Rand Fishkin

April 7, 2021 by Michael X. Heiligenstein

Big Tech Decency Ratings, 2021

March 30, 2021March 30, 2021 by Michael X. Heiligenstein

Facebook Decency Rating, 2021: 3/20

March 30, 2021 by Michael X. Heiligenstein

Amazon Decency Rating, 2021: 7/20

March 30, 2021 by Michael X. Heiligenstein

Google Decency Rating, 2021: 7/20

March 30, 2021 by Michael X. Heiligenstein

Apple Decency Rating, 2021: 14/20

March 30, 2021 by Michael X. Heiligenstein

How Companies Track You Online – The Definitive Guide

April 24, 2021March 3, 2021 by Michael X. Heiligenstein

How to Protect Your Privacy Online

December 28, 2020 by Michael X. Heiligenstein

Android Privacy Settings: What to Know

December 23, 2020 by Michael X. Heiligenstein

Personally Identifiable Information (PII)

November 30, 2020 by Michael X. Heiligenstein

Whale Phishing: Everything You Need to Know

November 30, 2020November 18, 2020 by Michael X. Heiligenstein

Identity Theft: How it Works & How to Protect Yourself

November 2, 2020 by Michael X. Heiligenstein

Phishing: The Definitive Guide

May 16, 2022October 26, 2020 by Michael X. Heiligenstein

17 Ways to Identify and Prevent Phishing Attacks

October 26, 2020October 23, 2020 by Michael X. Heiligenstein

How Phishing Scams Work – And How to Protect Yourself

October 8, 2020 by Michael X. Heiligenstein

Vishing, aka Voice Phishing: How to Protect Yourself

October 7, 2020 by Michael X. Heiligenstein

Spear Phishing Attacks: What You Need to Know

September 1, 2021September 29, 2020 by Michael X. Heiligenstein

6 Spear Phishing Example Emails – Plus Tips on Staying Safe

June 28, 2021September 26, 2020 by Michael X. Heiligenstein

Smishing, aka SMS Phishing: How to Protect Yourself

September 29, 2020September 25, 2020 by Michael X. Heiligenstein

10 Types of Phishing Attacks – With Examples

September 25, 2020 by Michael X. Heiligenstein

Phishing Awareness Training: How to Protect Your Organization

September 25, 2020 by Michael X. Heiligenstein

You clicked a fake link 🤷‍♀️

March 17, 2022September 10, 2020 by Michael X. Heiligenstein

Topics

  • Access Control (17)
  • Attacks (12)
  • Breaches (18)
  • Compliance (4)
  • Data (1)
  • Fraud (2)
  • IT (1)
  • Miscellaneous (2)
  • Phishing (15)
  • Privacy (4)
  • Resilience (2)
  • Risk Management (1)
  • Security Controls (3)
  • Statistics (11)
  • Tech (14)

Related Posts

  • Amazon Web Services (AWS) Data Breaches: Full Timeline Through 2022
  • Amazon Data Breaches: Full Timeline Through 2022
  • 26 Eye-Opening Data Breach Statistics – 2022
  • Top 10 Biggest Data Breaches of All Time
  • Microsoft Data Breaches: Full Timeline Through 2022
About

Privacy Policy

Contact
© 2022 Firewall Times • Built with GeneratePress