Content Disarm and Reconstruction: Eh, What’s Up Docx?

Previously I wrote about content disarm and reconstruction (CDR) with respect to steganography. Stego is really cool stuff, but demonstrating what CDR does with respect to documents makes things less…

Comments Off on Content Disarm and Reconstruction: Eh, What’s Up Docx?

Kaseya, Maersk, and Microsoft: Do You Do Due Diligence?

I subscribe to the Consumer Protection Law360 newsletter. Although I can’t justify a subscription to the full content, the newsletters have interesting one-paragraph blubs. Recently one such paragraph caught my…

Comments Off on Kaseya, Maersk, and Microsoft: Do You Do Due Diligence?

Content Disarm and Reconstruct

For years I have been asked by reporters about data breaches as they made the news. We “pundits” had pre-fabricated responses for everything. The story says that an IT administrator…

Comments Off on Content Disarm and Reconstruct

Fighting Diversity With Diversity

How do you fight diversity with diversity? To answer that question, we need to understand the diversity we are fighting.Flying KittenFox KittenWizard SpiderStone PandaMustang Panda (Not related to Mustang Sally)What…

Comments Off on Fighting Diversity With Diversity

Don’t Get Your Breaches in a Knot

A few years ago, I wrote a blog about why enterprises don’t care about the 10,000 worst passwords. The reason is simple. Not a single one of those passwords met…

Comments Off on Don’t Get Your Breaches in a Knot

Business Center Insecurity – The Case for DRM

Right after your hotel thanks you for your business, let me than you for your business too. Right after the front desk person thanks you as you leave the airline…

Comments Off on Business Center Insecurity – The Case for DRM

What Is SASE? Part One: Zero Trust

Before I go any further, I’ve got to walk the walk. To the right is my authentication; my business card. Conveniently my card has my phone number. You’ve got my…

Comments Off on What Is SASE? Part One: Zero Trust