Homepage
Open in app
Sign inGet started

MetaCert

Zero Trust cybersecurity for teams and remote workers

  • About MetaCert
  • MetaCert Website
  • Perhaps security controls are stupid and not the victims they fail to protect

    Perhaps security controls are stupid and not the victims they fail to protect

    I gave my email address to a security company so I could download their security report recently — mostly because a few of their tweets…
    Go to the profile of Paul Walsh
    Paul Walsh
    Aug 16, 2022
    What is an NFT?

    What is an NFT?

    My definition of a Non-fungible Token (NFT)
    Go to the profile of Paul Walsh
    Paul Walsh
    Aug 12, 2022
    A curated list of phishing attacks on employees at Sitel Okta Microsoft Globant Nvidia T-Mobile…

    A curated list of phishing attacks on employees at Sitel Okta Microsoft Globant Nvidia T-Mobile…

    This article documents a chain of Phishing-led cyberattacks on big organizations by a group called Lapsus$. It’s far from an extensive list…
    Go to the profile of Paul Walsh
    Paul Walsh
    Aug 12, 2022
    Why Cloudflare was protected against the SMS phishing attack that compromised Twilio

    Why Cloudflare was protected against the SMS phishing attack that compromised Twilio

    Hackers don’t break in, they login.
    Go to the profile of Paul Walsh
    Paul Walsh
    Aug 11, 2022
    Why Books Are a Good Use Case For NFTs

    Why Books Are a Good Use Case For NFTs

    If Audible gave us NFTs instead of traditional receipts…
    Go to the profile of Paul Walsh
    Paul Walsh
    Aug 3, 2022
    How the Bored Ape Yacht Club was probably compromised with a reverse-proxy phishing attack

    How the Bored Ape Yacht Club was probably compromised with a reverse-proxy phishing attack

    A phishing link sent from the Bored Ape’s official Instagram account was used to steal $1 million of Bored Ape Yacht Club NFTs recently…
    Go to the profile of Paul Walsh
    Paul Walsh
    Apr 25, 2022
    How to evaluate security vendors for a Zero Trust strategy to combat phishing-led attacks

    How to evaluate security vendors for a Zero Trust strategy to combat phishing-led attacks

    Before I get to the point, I need to frame your thinking. I promise it will make perfect sense.
    Go to the profile of Paul Walsh
    Paul Walsh
    Aug 26, 2021
    About METACERTLatest StoriesArchiveAbout MediumTermsPrivacyTeams