Quick Facts on Meltdown and Spectre for Small Businesses
2018 started off with a bang for cybersecurity experts and anyone with a computer. Here is a summary from various news sources of what...
Let's automate (security) and not procrastinate
With each dawn, there are new stories relating there has been yet another compromise and a mountain of data had been exfiltrated via an...
AI LT Effects: Not as Bad as Portrayed
The latest advance and paradigm shift which has been focused on is the application of AI to most walks of life. This will clearly change...
What's old is new again: Part II
An aspect of human nature not explored sufficiently is the lack of memory permanence. There is the distinct length of time people...
Are your employees paying ransom on your cyber attack?
A staggering 59% of office workers have paid ransom on their company’s ransom attack at work. A recent study, by Intermedia, a cloud...
Emotet Evolution: Banking Trojan Still Popular
For malware to continue to be relevant in the market and being used in one form or another there has to be an aspect that continues to be...
Lessons Learned from Uber’s Data Breach
Uber, the ride sharing company, recently announced a massive data breach that occurred in 2016, but ignored notifying the victims. The...
Message for the DoD: Security, It's Not just for Operations
Data comes in all forms and sizes. The composition of this also varies greatly dependent on the data owner. One actionable items...
Pertinent Log Management
In recent history there have been rather extensive and significant breaches affecting millions of people. This action has provided...
‘Tis the season…
Seemingly every year about this time, the phishing campaigns are presented to the consumers. The phishing emails have taken various forms...