They’re out there and they’re active!
Oh man. It is one of those days. You see the alert come across in your email from one of the many security subscriptions you have signed up for. “Attacks … Read More
Oh man. It is one of those days. You see the alert come across in your email from one of the many security subscriptions you have signed up for. “Attacks … Read More
Have you ever had one of those meetings where the business owner who came to you for help won’t answer a single question with any amount of detail? Maybe they … Read More
We hear this all the time. “I applied for an entry level role, but they wanted many years of experience!” First of all – as a hiring manager – we … Read More
Another month. Another zero-day. Another opportunity for vendors to push their agenda. There are two camps when it comes to vulnerabilities. On one side, you have the highly funded, venture-capital … Read More
As the threat landscape changes, so too do all the influences that make our job, interesting. Threat actors have found they can run their operations more like a business and … Read More
An interesting incident occurred with one of my friend’s clients. They made the executive decision to create websites, for internal use, with no security. None. Zero. No logins. No auditing. … Read More
At around 7AM Pacific time today, AWS took a digger again. This time, it appears to be a West-Coast outage. For about 30 minutes, the Internet went crazy. All eggs … Read More
There is a balance in all things. If you increase security, you reduce accessibility. If you increase turkey on your plate, you reduce potatoes. If you move to the cloud, … Read More
Generally speaking, we don’t call anybody out direct here. Generally speaking… But c’mon MLB! Your password requirements are 8-15 characters with NO SPECIAL CHARACTERS? It isn’t that it isn’t a … Read More
This is going to be quick. We recently had one of our peers tell us about a particular incident where they were troubleshooting a connectivity issue with a 3rd party … Read More