Biometric Legal Implications
Disclaimer: Neither SecureIQLab nor I are lawyers. Nothing in this blog should be construed as legal advice, which I understand costs a lot of money.Corporations increasingly collect and store biometric…
Disclaimer: Neither SecureIQLab nor I are lawyers. Nothing in this blog should be construed as legal advice, which I understand costs a lot of money.Corporations increasingly collect and store biometric…
Oddly enough, one of the last sectors to accept security technology was industrial systems. For years industrial systems stuck with proprietary protocols and software managed and monitored by humans and…
GoDaddy took an axe and gave education 40 whacks. And when they saw what they had done, they gave their employees 41. Hanlon's Razor states “never attribute to malice…
In this post, we break down what the recently-discovered FireEye and supply chain attack shows about your cyberattack surface. The above figure shows what we know so far about the…
“Change is the only constant.” -- Heraclitus Your cyberattack surface is the part of the computing environment that can be leveraged by an attacker to take advantage of any vulnerabilities.…
With 2020 (thankfully) coming to a close, it's time to focus on 2021. The world took a financial bullet from the Coronavirus, which leaves bad actors hungry. Sketchy people and…
The security landscape is drastically changed in the Post-COVID world. Before the pandemic, the journey towards cloud adoption was proceeding with casual speed. But now, business adoption of cloud and…