Learn with Vladimir¶
Secure Your iPhone In 5 Simple Steps

Your iPhone houses your entire digital existence - from cherished photographs and private messages to sensitive banking information and beyond. Whilst Apple's iPhone with the latest iOS offers impressive built-in security, it's not simply a "set and forget" arrangement. To properly shield your digital life from criminals, I recommend taking several straightforward measures. None of these steps are intrusive and shouldn't hamper your user experience.
Updated on 2025-11-12 with new security feature of iOS26. As a result it is now a list of 6 recommendations. To ensure the link works, I have not changed the blog post title.
A humble proposal: The InfoSec CIA triad should be expanded
This article was first published by Help Net Security and can be accessed on their website in International English spelling.
What if I told you that what you may have learned about protecting information and information systems is incomplete? Curious? Then read on.
The inconsistent and incomplete definitions of essential properties in information security create confusion within the InfoSec community, gaps in security controls, and may elevate the costs of incidents.
In this article, I will analyse the CIA triad, point out its deficiencies, and propose to standardize the terminology involved and expand it by introducing two additional elements.
Fix Identity and Access Management

This article also features in the Computer Weekly / TechTarget Cyber Security ThinkTank: https://www.computerweekly.com/opinion/In-the-cloud-effective-IAM-should-align-to-zero-trust-principles
The topic of “best practices in IAM” is complex due to the intricacies of Identity and Access Management (IAM) and the unique policies, processes, and procedures of each organisation. Therefore, a one-size-fits-all approach does not work.
The Magic of the DNS deciphered

To most people, it may seem like a magic trick: open a web browser and type apple.com and the web page opens. If you showed this to someone in the 15th century, you could be accused of witchcraft! Instead of the magic, however, behind all of this is genius engineering by the smart people who designed the Internet protocols over 40 years ago! The DNS protocol plays the key part in the Internet protocols; one could say that without the DNS, the Internet would not exist in its current form.