To Breach or Not to Breach

The rapid adoption of could computing was yesterday’s news 5 years ago. Today’s news is that one of the most critical cloud security technologies is woefully ineffective. In addition to…

Comments Off on To Breach or Not to Breach

LastPass, LostPass, or HallPass

I believe that all of our readers have heard about the LastPass Breach. There is a lot of seriously flawed information out there on social media. Yes, it appears to…

Comments Off on LastPass, LostPass, or HallPass

The Myth of Password Cracking AKA Bad Analysis

Fact: The value of a great test can be negated by inaccurate, or missing analysis. Now onto the myth of password cracking. We’ve all heard the advice to make strong passwords. The…

Comments Off on The Myth of Password Cracking AKA Bad Analysis

Planet of the APIs

Yeah, sure I had fun making the Planet of the Apes pun, but this really is the planet of the APIs (application programming interfaces). Want to travel around the earth?…

Comments Off on Planet of the APIs

Putting Firewalls to the Test

The next generation firewall (NGFW) was invented by a gentleman named Jean-Luc Picard on September 28, 1987, but it would be several years before terrestrial bound enterprises (no pun intended)…

Comments Off on Putting Firewalls to the Test

The Case Against Default Libraries

Windows has a sort of handy feature, but nobody has ever found it. Well, yeah, this one is ubiquitous. The “libraries.” Simple enough, a link to default folders for documents,…

Comments Off on The Case Against Default Libraries

Vulnerabilities, Exploits, and Payloads

Unless you’ve been living under a rock or have a life, you’ve heard more about Log4j2 than you might care to have. You’ve probably heard talk of Log4Shell, Log4j, exploits,…

Comments Off on Vulnerabilities, Exploits, and Payloads

Passphrases and the Passphrase Token Attack

Never say “passphrase” around a pedant. Peasants and pheasants are OK, but pedants will bring up the passphrase token attack, frequently overstate the threat, or flat out get it wrong.…

Comments Off on Passphrases and the Passphrase Token Attack

Must Have Uppercase, Lowercase, and Basket case.

If there’s one thing I hate more than bad password advice it’s okra. But this is about cybersecurity, not culinary mayhem. Thanks to the added security multi-factor authentication (MFA) provides,…

Comments Off on Must Have Uppercase, Lowercase, and Basket case.