Lately, we have been hearing a steady refrain concerning cybersecurity: “It is impossible to guarantee security. Breaches are inevitable.” Is it really so because it is asserted with authority and confidence? Is it so because it is oft repeated? Inevitably, we are...
This past week I read a pretty interesting article, posted on SiliconANGLE, about vulnerabilities found in cloud applications. It had the unfortunate title of: Report finds 34M vulnerabilities across AWS, Google Cloud and Azure This was compounded by the lead off...
Join me on a webinar about managing secrets such as passwords, encryption keys, API keys, etc. July 17, 2019 – Keeping Secrets, Secret! How to Manage Highly Sensitive Data to Protect Your Organization...
Are your security tools able to uncover attackers who have made it into your network and are now hiding in the shadows? This is a very interesting read… Hiding in the Shadows at ‘’ManagedBy’’...
Intel continues to have security issues — this one affects MacBooks as well… Almost all Macs since 2011 affected by new ‘ZombieLoad’ Intel chip vulnerability, patch included in macOS 10.14.5 Also…...