The Mirai Botnet Attack, Revenge of the IoT & Change Your Bleepin’ Defaults Already!!!!Once upon a time in early 2016, we were talking with pen tester Ken Munro about the security of IoT gadgetry — everything from wireless…Oct 27, 2016Oct 27, 2016
Want a server setup like Kim Jong Un?I can only imagine it’s a high stress job doing IT support for Kim Jong Un as he’s the kind of manager who probably watches you over your…Sep 29, 2016Sep 29, 2016
OPM Breach Report: It’s time for CSOs to embrace data-centric securityThe Committee on Oversight and Government Reform released a fascinating 231-page report detailing the how and why behind the epic breach at…Sep 19, 2016Sep 19, 2016
Cyber Espionage: Could Russian and Korean Hackers Have Been Stopped (With UBA)?Once upon a time, breaking into the Democratic National Committee required non-virtual thieves picking real door locks and going through…Jun 17, 2016Jun 17, 2016
Panama Papers Leak: The New Normal?Imagine if robbing banks were so easy and common that the only headlines were about all the taxes the thieves were avoiding.Apr 26, 2016Apr 26, 2016