Don’t Get Your Breaches in a Knot

A few years ago, I wrote a blog about why enterprises don’t care about the 10,000 worst passwords. The reason is simple. Not a single one of those passwords met…

Comments Off on Don’t Get Your Breaches in a Knot

Business Center Insecurity – The Case for DRM

Right after your hotel thanks you for your business, let me than you for your business too. Right after the front desk person thanks you as you leave the airline…

Comments Off on Business Center Insecurity – The Case for DRM

What Is SASE? Part One: Zero Trust

Before I go any further, I’ve got to walk the walk. To the right is my authentication; my business card. Conveniently my card has my phone number. You’ve got my…

Comments Off on What Is SASE? Part One: Zero Trust

The Supply Chain Looks Like A Bunny Rabbit With A Drum

Just in case you are not familiar with the Energizer Bunny take a quick look here to see the energetic bunny in action.The SolarWinds compromise has elevated already serious concerns…

Comments Off on The Supply Chain Looks Like A Bunny Rabbit With A Drum

Biometric Legal Implications

Disclaimer:  Neither SecureIQLab nor I are lawyers. Nothing in this blog should be construed as legal advice, which I understand costs a lot of money.Corporations increasingly collect and store biometric…

Comments Off on Biometric Legal Implications

ICS Security

Oddly enough, one of the last sectors to accept security technology was industrial systems. For years industrial systems stuck with proprietary protocols and software managed and monitored by humans and…

Comments Off on ICS Security

Inciting Supply Chain Attacks GoDaddy Style

  GoDaddy took an axe and gave education 40 whacks. And when they saw what they had done, they gave their employees 41. Hanlon's Razor  states “never attribute to malice…

Comments Off on Inciting Supply Chain Attacks GoDaddy Style