Are You Configured for Failure?

Every year, an exorbitant amount of money is spent on ensuring companies’ digital safety, yet data breaches continue to rise. Three main reasons cause this unfortunate event: First, companies often misconfigured the cloud, making the system an easy target. Second, aggressive types of ransomware attacks are on the rise. Third, companies are being too permissive […]

Spooky Action from a Distance

The first question that popped into my mind when I became aware of the global IT chaos that started this Friday and the corresponding causes that were articulated was, “How do two independent objects cause each other to react so violently that the net effect generated from such interaction causes mass disruption?” Patch failures are […]

Pledge vs Reality – Secure by Design

A few weeks ago, I stumbled upon the website of a company that has recently nominated itself to be part of the “Secure of Design,” an endeavor championed by the Federal government and reinforced via several executive orders and corresponding guidelines disseminated by the Cybersecurity and Infrastructure Security Agency (CISA). In its ignorance, I saw […]

Make WAAP Interesting Again by Quantifying Operational Efficiency and Secure by Design.

The adoption of the cloud is the biggest driver of the DevOps development process. Before cloud, waterfall (80’s to late 90’s) and agile (2000 to late 2000’s) were the most prominent development processes. Each re-enforces their own specific application architecture, namely N-Tier and Monolithic. Each required very specific kinds of deployment and packaging using a […]

Efficiency is All You Need

A chance encounter with Texas’s beloved company’s Chief Human resources officers tempted me to ask a candid question. The question was a question that lots of sales engineers will be asking when they attempt to sell a technology product to an organization. The question from a Sales Engineer typically is: “What is one of the […]

Panda is Not Cute Anymore

SecureIQLab’s threat intel and research team recently discovered a data dump purporting to belong to a Chinese company. The company in question was breached by an unknown entity that may have a grudge against the Chinese government. Upon closer examination, it appears that the breached company gets contracts from the Chinese government to do the […]

The Only Credible 2024 Cyber Security Predictions

If you’re like me, you’re tired of blogs and whitepapers that all make the same predictions concerning the coming year’s cyber-security landscape. The predictions are just like common password practices. At the end of the year, you increment by one and change nothing else. In fact, the predictions are so obvious that even Nostradamus didn’t […]

Navigating the XDR Landscape: Choosing the Right Solution through Independent Test Results

In the rapidly evolving digital landscape, organizations are confronted with the mounting challenge of safeguarding their networks, data, and assets against unyielding cyber threats. As the threat landscape becomes more complex, traditional security solutions find it difficult to keep pace, leaving organizations exposed and fragmented in their defense strategies. Consequently, organizations worldwide seek a comprehensive […]

Holy Shift Batman! IT’s 2023!

When an organization decides change is on the horizon, the horizon comes in a little closer. SecureIQLab was founded in 2019 to provide top-tier cloud validation services to enterprises, vendors, and governments to meet the rising need for cloud security. If we could have predicted how a global pandemic would change the trajectory and expansion […]

2021 Post-Mortem and 2022 Year of Resilience

Once upon a time, I proclaimed I had the solution to the problem. A wise man then responded by asking, “What are the trade-offs?” As the year draws to a close, we look back at the (un)eventful incidents and alarm bells that were raised this year. Patch failure (Who watches the watchmen?) Example: Print Nightmare […]