Don’t Get Your Breaches in a Knot
A few years ago, I wrote a blog about why enterprises don’t care about the 10,000 worst passwords. The reason is simple. Not a single one of those passwords met…
A few years ago, I wrote a blog about why enterprises don’t care about the 10,000 worst passwords. The reason is simple. Not a single one of those passwords met…
Right after your hotel thanks you for your business, let me than you for your business too. Right after the front desk person thanks you as you leave the airline…
As a history buff, I was delighted when my manager asked me to write a blog about WAFs! Three thousand five hundred and seventy words later I was informed that…
Before I go any further, I’ve got to walk the walk. To the right is my authentication; my business card. Conveniently my card has my phone number. You’ve got my…
If privacy ever did exist, it’s gone the way of the unicorn. Yes Victoria, unicorns once existed. Before proceeding, I’d like to give shout out to the multi-talented Bill Brenner…
Before I proceed, for the pedants out there, yes, I know that the Greek Trojan Horse can be viewed as a supply chain attack involving a C-section on a wooden…
Just in case you are not familiar with the Energizer Bunny take a quick look here to see the energetic bunny in action.The SolarWinds compromise has elevated already serious concerns…
Disclaimer: Neither SecureIQLab nor I are lawyers. Nothing in this blog should be construed as legal advice, which I understand costs a lot of money.Corporations increasingly collect and store biometric…
Oddly enough, one of the last sectors to accept security technology was industrial systems. For years industrial systems stuck with proprietary protocols and software managed and monitored by humans and…
GoDaddy took an axe and gave education 40 whacks. And when they saw what they had done, they gave their employees 41. Hanlon's Razor states “never attribute to malice…