FileHash v5.0 has just been released, and it comes with a focus on making it easier to automate the following two things: Obtain the checksums of a set of files in a directory (and subdirectory), and then use that checksum list to compare the same directory structure...
On June 30, 2021, I had the privilege of presenting the second of two introductory cybersecurity webinars to small businesses, on behalf of the Bluefield West Virginia Economic Development Authority, and in conjunction with the West Virginia Small Business Development...
On June 16, 2021, I had the privilege of presenting the first of two introductory cybersecurity webinars to small businesses, on behalf of the Bluefield West Virginia Economic Development Authority, and in conjunction with the West Virginia Small Business Development...
Once upon a time, I needed to get a quick and dirty file integrity checking process in place for Windows systems so that we could meet a customer compliance requirement that was growing more and more popular. FIM – File Integrity Monitoring At the time, we were...
…that is the question. Every time a software vendor experiences a vulnerability or releases patches for a serious security issue, the debate about Full Disclosure or Responsible Disclosure gains a little more steam. Just how much information should a vendor disclose...