Cybersecurity Getting the Best Value From Penetration Testing Ring the bell, capture the flag, physical pen testing, dynamic app testing - a modern pentest has more options than many cars. How do you approach buying one?
Cybersecurity Bad Cybersecurity Advice Don't scan QR codes! Use an email to log in! Look for misspellings in emails! Just stop, please?
Cybersecurity Quickly Cutting Through the New Vulnerability Panic Why is every vulnerability the worst thing since sliced bread? Here are some tips for cutting through the clickbait and FUD to see if you need to be concerned.
Cybersecurity Driving Value Conversations in Cybersecurity and Technology Whether you're trying to convince management of a cybersecurity project, or trying to sell into your customer, mastering value-based conversations is critical for cybersecurity.
Cybersecurity Powerful Yet Overlooked - DNS as a Security Solution Almost nothing you do online works without DNS. It is ubiquitous. But have you ever thought about DNS as part of your security program? Controlling how it is used can make a significant impact on your environment.
Linux GRUB's No Good, Very Bad, Day (at the hands of Microsoft) A new Microsoft patch - for a 2 year old vlun - is preventing dual-boot computers from booting Linux. Monopolies at work again. Let's break that cycle.
Cybersecurity Axioms For Your Next Vendor Fair Experience Vendor swag. After parties. Badge scans and contact information harvesting. If you're a serious buyer (or influencer) at an IT or cybersecurity conference, you'll want to think about your vendor fair strategy.
Cybersecurity Lather, Rinse, Repeat - the Never Ending Cycle of Good Cybersecurity Like your doctor says when you go in for that annual physical you skipped: eat more veggies, get more exercise, sleep well. The same holds true for good cybersecurity - it's the repetitive, boring stuff that often matters most.
Cybersecurity Today's Outage Brought To You By a Lack of Competition The CrowdStrike and Windows problem isn't big because of the technical details, it's big because of the market one.
Cybersecurity The Fallacy of a Safe Encryption Backdoor Governments the world over want mandatory backdoors into encrypted communications. But there's no such thing as a secure way to do this.
Cybersecurity Are You Prepared For When Your *aaS's Environment Is Hacked? Snowflake environments are being compromised left and right. Have you set yourself up for *aaS success, or is your company ready to be breached in a similar fashion?
Personal When Your Choice Impacts My Privacy Copilot+ Recall might be fine for you, but if I'm sharing any data with you your choice impacts my privacy. And that's just one example.
Cybersecurity No, It Wasn’t a Nation-State Actor. Really. Think it was a nation state malicious actor? Think again. so many more likely causes for that outage you're concerned about. Honest.
Cybersecurity Post LastPass Breach - Real Consequences, Real Lessons LastPass was breached, and your passwords may be compromised. But password managers are still critical for security, in both personal and professional settings.
Cybersecurity Cybersecurity - Misinformation As a Security Problem Political argument has brought the term "misinformation" into the spotlight. Well, it is a cybersecurity problem as well.