by Ryan Hamrick | Oct 6, 2022 | Blog, Security
Absolutely EVERYTHING! As an attack vector, the computer supply chain is attractive one and attacks on it continue to rise. Most people view a supply chain attack as something that affects only hardware. A typical scenario would involve a malicious actor working in a...
by John Bruggeman | Sep 29, 2022 | Blog, Security
I am a shameless promoter of information security awareness and training (A&T). If I could get people to take three or four minutes of training on information security every week, I would do it. I want everyone to be able to detect phishing emails and fake text...
by Jana Dorton | Sep 21, 2022 | Blog, Digital Workspace, Security
The future (and arguably the present) of networking belongs to the Cloud. Legacy WAN networks deployed on aging MPLS systems can no longer handle the sheer amount of data, processing power, and security needed to keep businesses competitive. The resources required to...
by Mike Wiener | Sep 19, 2022 | Blog, Security
What do the search for old car parts and cyber reconnaissance have in common? Google dorking. Before you head off this page to check out life hack videos, let me explain. I have been using Google search, Google cache, and the Internet archive for years now to help me...
by John Bruggeman | Sep 13, 2022 | Blog, Security
I’m writing this blog post because it needs to be written. It seems pretty obvious that you should test patches to your OS or applications in a test environment that closely matches your production environment before you deploy that patch in production....
by Justin Hall | Aug 17, 2022 | Blog, Security
One of the more fiery topics of discussion amongst security practitioners and luminaries in 2022 is the role of phishing simulation and assessment in an enterprise security control strategy. It has long been gospel that security awareness training is an essential...
Recent Comments