WAF or Gaffe: Comparing Cloud Web Application Firewalls
As a history buff, I was delighted when my manager asked me to write a blog about WAFs! Three thousand five hundred and seventy words later I was informed that…
As a history buff, I was delighted when my manager asked me to write a blog about WAFs! Three thousand five hundred and seventy words later I was informed that…
Before I go any further, I’ve got to walk the walk. To the right is my authentication; my business card. Conveniently my card has my phone number. You’ve got my…
If privacy ever did exist, it’s gone the way of the unicorn. Yes Victoria, unicorns once existed. Before proceeding, I’d like to give shout out to the multi-talented Bill Brenner…
Before I proceed, for the pedants out there, yes, I know that the Greek Trojan Horse can be viewed as a supply chain attack involving a C-section on a wooden…
Just in case you are not familiar with the Energizer Bunny take a quick look here to see the energetic bunny in action.The SolarWinds compromise has elevated already serious concerns…
Disclaimer: Neither SecureIQLab nor I are lawyers. Nothing in this blog should be construed as legal advice, which I understand costs a lot of money.Corporations increasingly collect and store biometric…
GoDaddy took an axe and gave education 40 whacks. And when they saw what they had done, they gave their employees 41. Hanlon's Razor states “never attribute to malice…